Monitor Certificate Transparency Logs For Phishing Domains
☆23Nov 19, 2018Updated 7 years ago
Alternatives and similar repositories for stinkyphish
Users that are interested in stinkyphish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆327Sep 11, 2024Updated last year
- ☆12Jan 13, 2018Updated 8 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Oct 11, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆12Sep 4, 2013Updated 12 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- An npm package to defang and refang IoC☆13Sep 7, 2025Updated 6 months ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- ☆11Oct 18, 2019Updated 6 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Jan 15, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Oct 25, 2018Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago
- SMTP server / sinkhole for collecting spam☆46Jul 30, 2018Updated 7 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆56Aug 30, 2018Updated 7 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- List of telegram groups, channels & bots // Список интересных групп, каналов и ботов телеграма // Список чатов для программистов☆14Aug 3, 2023Updated 2 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- Malice Yara Plugin☆29Sep 8, 2019Updated 6 years ago
- ☆18Jan 20, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Shim database persistence (Fin7 TTP)☆37Feb 25, 2020Updated 6 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Go tool to perform DNS rebinding☆24Nov 1, 2018Updated 7 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 4 months ago