phishai / idn_generatorLinks
Utility to generate similar IDN domain names
☆48Updated 7 years ago
Alternatives and similar repositories for idn_generator
Users that are interested in idn_generator are comparing it to the libraries listed below
Sorting:
- A finder of domain typos showing country of IP address☆166Updated 2 years ago
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago
- SMTP server / sinkhole for collecting spam☆46Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- ☆61Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago
- A toolkit for Security Researchers☆127Updated 6 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆68Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Python script to hunt phishing kits☆137Updated 2 years ago
- Leak File Analyzer☆63Updated 8 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 8 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆70Updated 9 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- DNS zone transfer research☆59Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 3 years ago