phishai / phish-ai-apiLinks
Official python API for Phish.AI public and private API to detect zero-day phishing websites
β174Updated 7 years ago
Alternatives and similar repositories for phish-ai-api
Users that are interested in phish-ai-api are comparing it to the libraries listed below
Sorting:
- Interface to manage and centralize Google Alert informationβ231Updated 2 years ago
- A medium interaction printer honeypot π―β202Updated last year
- Hamburglar -- collect useful information from urls, directories, and filesβ319Updated 2 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.β15Updated 3 years ago
- A Github organization reconnaissance tool.β219Updated 2 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leakβ101Updated 8 years ago
- A powerful and extensible wireless drop boxβ266Updated 6 years ago
- Detect silent (unwanted) changes to files on your systemβ161Updated 5 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.β131Updated 7 years ago
- penetration testing scriptsβ136Updated 5 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sourcesβ99Updated 7 years ago
- An information gathering tool to collect git commit emails in version control host servicesβ154Updated 6 years ago
- honeyΞ» - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on topβ¦β517Updated 6 years ago
- Certificate Transparency Log aggregation, parsing, and streaming serviceβ102Updated 7 years ago
- Automated WiFi limit evasionβ118Updated 8 years ago
- Various Tools and Docker Imagesβ280Updated last month
- β261Updated 6 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.β141Updated 7 years ago
- A collection of Ansible roles for automating infosec builds.β93Updated 7 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: thβ¦β108Updated 7 years ago
- A tool to surface security issues in python codeβ226Updated 8 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.β323Updated 8 months ago
- AMIRA: Automated Malware Incident Response & Analysisβ151Updated 4 months ago
- Mercure is a tool for security managers who want to train their colleague to phishing.β268Updated 4 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.β142Updated 6 years ago
- HonSSH is designed to log all SSH communications between a client and server.β375Updated 3 years ago
- β92Updated 6 years ago
- β352Updated 3 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.β415Updated 2 years ago
- CERT Tapioca for MITM network analysisβ183Updated last year