Research only!
☆15Aug 1, 2018Updated 7 years ago
Alternatives and similar repositories for phishing-kits-I-found
Users that are interested in phishing-kits-I-found are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Sep 12, 2020Updated 5 years ago
- Utility to scrape pastebin's incoming feed for known malware techniques☆20Feb 4, 2020Updated 6 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Exploit Pack - One step ahead☆11Sep 9, 2013Updated 12 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- CMU's attack lab☆13Sep 7, 2023Updated 2 years ago
- PyCon 2017 talk about using abstraction to help with Library UX☆12May 20, 2017Updated 8 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- A Python toolbox for Mach-O files analysis.☆21Jun 21, 2024Updated last year
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- A collection of infosec related scripts and information.☆54Oct 2, 2024Updated last year
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- ☆37Feb 3, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A small image slideshow app written in python using pygame.☆12Mar 10, 2026Updated last month
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- Download images from URLs within a CSV☆13Jan 6, 2021Updated 5 years ago
- X-Ways C# X-Tension API☆17May 28, 2013Updated 12 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- Malware Control Monitor☆88Mar 2, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Awesome Hacking and Tech. Related Tutorials☆12May 14, 2025Updated 11 months ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Machine Learning and Datasets for Malwares Static Analysis.☆19Jul 29, 2022Updated 3 years ago
- This will be the home for Python Monthly and will be ran using Github Pages☆10May 24, 2017Updated 8 years ago
- Builds a hosts file and an Unbound config for blocking advertising and malware domains.☆10Jan 3, 2016Updated 10 years ago
- SaltStack formula for deploying Cuckoo Sandbox☆14Nov 27, 2018Updated 7 years ago
- Facebook hacking tool☆11Mar 3, 2023Updated 3 years ago
- ☆15Nov 11, 2021Updated 4 years ago
- 🐍 My python code for codewars 🐍☆13Oct 29, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- This repository contains tools used by 401trg.☆20Apr 14, 2021Updated 5 years ago
- Tools collection for android devices regarding to firmware modification on windows☆14May 16, 2019Updated 6 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Jan 30, 2018Updated 8 years ago
- The ACSC CyberTools Plugins are build upon the functionality of the Constellation data visualisation platform to deliver enrichments suit…☆26Jul 26, 2023Updated 2 years ago
- Personal antivirus written in Rust (to learn Rust and Antivirus mechanics)☆13May 5, 2018Updated 7 years ago
- FRAC and RIFT☆17Mar 16, 2019Updated 7 years ago