☆81Jun 27, 2021Updated 4 years ago
Alternatives and similar repositories for pyopdb
Users that are interested in pyopdb are comparing it to the libraries listed below
Sorting:
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- Implementations of 3 phishing detection and identification baselines☆20Nov 25, 2024Updated last year
- ☆537Feb 19, 2026Updated last week
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- A phishing kit collector for scavengers☆220Jan 22, 2026Updated last month
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆189Apr 24, 2025Updated 10 months ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- Get a stable, canonical version of any URL, with DNS and HTTPS checks, redirects, tracker stripping, and canonical link extraction!☆13Feb 19, 2026Updated last week
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- ☆19Jan 31, 2025Updated last year
- A library to parse macOS LoginItems☆18Aug 28, 2022Updated 3 years ago
- endlessh auto reporting IPs to abuseipdb.com☆16Jan 15, 2025Updated last year
- Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing dom…☆1,510Updated this week
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- find historical account IDs for specified twitter @ name using wayback machine captures☆25Oct 15, 2021Updated 4 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- Python wrapper for urlscan.io's API☆105Oct 28, 2021Updated 4 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Jun 29, 2024Updated last year
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- The central repository for adding or removing domains, links, and IPs from the Phishing.Database project.☆80Feb 15, 2026Updated 2 weeks ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- ☆16Aug 29, 2025Updated 6 months ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- Model Detect Phishing Website by using Machine Learning for Project Chongluadao☆18Aug 10, 2021Updated 4 years ago
- Hatching Triage public command-line utility and API library.☆74Oct 9, 2023Updated 2 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Updated this week
- Notes for High Availability MISP in AWS☆19Nov 6, 2019Updated 6 years ago
- a tool that creates permutations of domain names using homographic unicode characters☆21Oct 21, 2022Updated 3 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- A CALDERA Plugin Template☆20Jan 7, 2026Updated last month
- Frontend of Boltz (2019-2020)☆21Apr 28, 2023Updated 2 years ago
- A Burp Suite extension to add a custom header (e.g. JWT)☆19Dec 3, 2020Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆20Apr 18, 2020Updated 5 years ago