Utility to generate similar IDN domain names
☆48Mar 21, 2018Updated 7 years ago
Alternatives and similar repositories for idn_generator
Users that are interested in idn_generator are comparing it to the libraries listed below
Sorting:
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Honeynet Project generic authenticated datafeed protocol☆19Jun 12, 2019Updated 6 years ago
- Python script for privilege escalation for Python☆11Jun 5, 2020Updated 5 years ago
- ☆14Dec 23, 2022Updated 3 years ago
- Docker container running cowrie with DShield output enabled.☆17Jun 8, 2016Updated 9 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆66Mar 6, 2018Updated 8 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Jun 10, 2023Updated 2 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Microsoft Flow Attack Framework☆23Nov 14, 2019Updated 6 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Dec 30, 2013Updated 12 years ago
- ☆31Jul 14, 2025Updated 7 months ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- A low/zero interaction ssh authentication logging honeypot☆25Feb 4, 2026Updated last month
- Bro IDS programs collection.☆146Oct 16, 2019Updated 6 years ago
- Web based Manager for Yara Rules☆58Mar 9, 2020Updated 6 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆23Nov 19, 2018Updated 7 years ago
- Flood Shield is a very fast http flood blocker☆29Apr 21, 2015Updated 10 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- ☆64Feb 12, 2022Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Blackhole Router Site☆33Apr 16, 2024Updated last year
- PowerShell module for Cisco Firepower Management Center (FMC)☆12Sep 17, 2019Updated 6 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- ☆11Oct 8, 2019Updated 6 years ago
- An example for implementation of ssdeep similarity search optimized with elasticsearch☆34Sep 19, 2017Updated 8 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago