Official python API for Phish.AI public and private API to detect zero-day phishing websites
☆174Apr 26, 2018Updated 7 years ago
Alternatives and similar repositories for phish-ai-api
Users that are interested in phish-ai-api are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- Utility to generate similar IDN domain names☆48Mar 21, 2018Updated 8 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54May 11, 2021Updated 4 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Aug 10, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Find phishing kits which use your brand/organization's files and image.☆239Jan 21, 2019Updated 7 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- Zero-Width Space Steganography, encodes/decodes hidden messages as non printable/readable characters.☆153Feb 13, 2025Updated last year
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Jun 12, 2019Updated 6 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Phishing catcher using Certstream☆1,795Aug 13, 2024Updated last year
- A phishing kit collector for scavengers☆221Jan 22, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated last year
- This is a python version of samesame repo to generate homograph strings☆24Aug 22, 2018Updated 7 years ago
- The most complete open-source tool for Twitter intelligence analysis☆1,968Feb 6, 2019Updated 7 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- ☆28Jul 5, 2025Updated 8 months ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 10 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- An information gathering tool to collect git commit emails in version control host services☆152May 5, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/burp-extensions☆10Feb 18, 2020Updated 6 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- ☆24Apr 17, 2021Updated 4 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Aug 25, 2021Updated 4 years ago
- A tool to evaluate Content Security Policies.☆71Jun 20, 2020Updated 5 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- Cyber Intel Management☆50Jan 25, 2018Updated 8 years ago