Research only!
☆15Aug 1, 2018Updated 7 years ago
Alternatives and similar repositories for phishing-kits-I-found
Users that are interested in phishing-kits-I-found are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Sep 12, 2020Updated 5 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Exploit Pack - One step ahead☆11Sep 9, 2013Updated 12 years ago
- Hi, this is Synabun. A little bit of this and a little bit of that. Have fun with it, hope it helps someone is some way.☆55Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- CMU's attack lab☆13Sep 7, 2023Updated 2 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- PyCon 2017 talk about using abstraction to help with Library UX☆12May 20, 2017Updated 8 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- A Python toolbox for Mach-O files analysis.☆21Jun 21, 2024Updated last year
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- A collection of infosec related scripts and information.☆54Oct 2, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- ☆37Feb 3, 2017Updated 9 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- Download images from URLs within a CSV☆13Jan 6, 2021Updated 5 years ago
- X-Ways C# X-Tension API☆17May 28, 2013Updated 12 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- A Plugin for FilamentPHP that adds an diagram-style input.☆13Oct 9, 2023Updated 2 years ago
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆13Oct 7, 2019Updated 6 years ago
- Malware Control Monitor☆89Mar 2, 2015Updated 11 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- Awesome Hacking and Tech. Related Tutorials☆12May 14, 2025Updated 11 months ago
- WP-CLI Helpers is a bundle of shell time saver aliases and function for wp-cli (http://wp-cli.org/).☆19May 18, 2014Updated 11 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Machine Learning and Datasets for Malwares Static Analysis.☆19Jul 29, 2022Updated 3 years ago
- Builds a hosts file and an Unbound config for blocking advertising and malware domains.☆10Jan 3, 2016Updated 10 years ago
- SaltStack formula for deploying Cuckoo Sandbox☆14Nov 27, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Nov 11, 2021Updated 4 years ago
- 🐍 My python code for codewars 🐍☆13Oct 29, 2019Updated 6 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- It uploads user photos without user permission to server☆15Oct 7, 2018Updated 7 years ago
- Tools collection for android devices regarding to firmware modification on windows☆14May 16, 2019Updated 6 years ago
- This repository contains tools used by 401trg.☆20Apr 14, 2021Updated 5 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago