phishai / phish-ai-api
Official python API for Phish.AI public and private API to detect zero-day phishing websites
β172Updated 6 years ago
Alternatives and similar repositories for phish-ai-api:
Users that are interested in phish-ai-api are comparing it to the libraries listed below
- Interface to manage and centralize Google Alert informationβ232Updated 2 years ago
- Hamburglar -- collect useful information from urls, directories, and filesβ317Updated 2 years ago
- A medium interaction printer honeypot π―β202Updated last year
- Tracking the trackers. Draw connections between scripts and domains on website.β15Updated 3 years ago
- Detect silent (unwanted) changes to files on your systemβ159Updated 4 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.β268Updated 4 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sourcesβ98Updated 7 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leakβ101Updated 8 years ago
- β261Updated 6 years ago
- Certificate Transparency Log aggregation, parsing, and streaming serviceβ103Updated 7 years ago
- A machine learning based social media pen-testing toolβ149Updated 8 years ago
- An information gathering tool to collect git commit emails in version control host servicesβ153Updated 5 years ago
- An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.β328Updated last week
- Using serverless functions to provide an API for checking potential passwords against an enormous corpus of passwords leaked from securitβ¦β113Updated 7 years ago
- Various Tools and Docker Imagesβ279Updated 6 years ago
- AMIRA: Automated Malware Incident Response & Analysisβ151Updated last month
- detectem - detect software and its version on websites.β155Updated 3 years ago
- A Github organization reconnaissance tool.β216Updated last year
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.β140Updated last year
- Automated WiFi limit evasionβ119Updated 8 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: thβ¦β108Updated 7 years ago
- β92Updated 6 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.β142Updated 6 years ago
- A collection of Ansible roles for automating infosec builds.β92Updated 7 years ago
- Main Build directoryβ178Updated 5 years ago
- penetration testing scriptsβ136Updated 5 years ago
- HonSSH is designed to log all SSH communications between a client and server.β374Updated 3 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emailsβ119Updated 2 years ago
- Demonstrating that disabling ICC in docker does not block raw packets between containers.β65Updated 7 years ago
- A powerful and extensible wireless drop boxβ265Updated 6 years ago