phishai / phish-protectLinks
Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.
☆119Updated 7 years ago
Alternatives and similar repositories for phish-protect
Users that are interested in phish-protect are comparing it to the libraries listed below
Sorting:
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Shodan Firefox Add-on☆153Updated 4 years ago
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- ☆56Updated 8 years ago
- a low-interaction honeypot☆94Updated 8 years ago
- This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script rem…☆101Updated 3 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- A simple command-line script to interact with the virustotal-api☆61Updated 7 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 7 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Linux file read monitor☆91Updated 2 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Repo for autosnort scripts.☆157Updated 4 years ago
- DNS zone transfer research☆59Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆88Updated 3 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 7 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- A collection of scripts that help handling X.509 certificate and TLS issues☆128Updated 3 months ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- ☆145Updated 9 years ago
- A fully featured malware scanner for Linux desktops and servers.☆68Updated 3 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆127Updated 7 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago