phishai / phish-ai-api
Official python API for Phish.AI public and private API to detect zero-day phishing websites
☆170Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for phish-ai-api
- Interface to manage and centralize Google Alert information☆233Updated last year
- Hamburglar -- collect useful information from urls, directories, and files☆316Updated last year
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆512Updated 6 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆150Updated last year
- Tracking the trackers. Draw connections between scripts and domains on website.☆14Updated 3 years ago
- A Github organization reconnaissance tool.☆215Updated last year
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- A tool to surface security issues in python code☆226Updated 7 years ago
- A powerful and extensible wireless drop box☆264Updated 5 years ago
- Various Tools and Docker Images☆278Updated 6 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- A medium interaction printer honeypot 🍯☆200Updated last year
- An information gathering tool to collect git commit emails in version control host services☆152Updated 5 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Updated 2 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆372Updated 2 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆190Updated 7 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 6 years ago
- penetration testing scripts☆137Updated 5 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆139Updated 6 years ago
- Automated WiFi limit evasion☆118Updated 7 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Updated 5 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- Resources for developers and security engineers to learn the ropes of application security☆99Updated 6 years ago
- ☆350Updated 3 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆143Updated 6 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆284Updated last year