phishai / phish-protect
Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.
☆118Updated 6 years ago
Alternatives and similar repositories for phish-protect:
Users that are interested in phish-protect are comparing it to the libraries listed below
- Public crawler and data from Tripwire: Inferring Internet Site Compromise☆95Updated 7 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- a low-interaction honeypot☆93Updated 7 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- A service for monitoring whether chat apps etc. leak URLs☆56Updated 6 years ago
- Google Chrome extension implementing JavaScript Zero☆149Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆152Updated 4 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Smoking Linux Every Day!☆54Updated 4 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆174Updated 6 years ago
- WaitList.dat Parser☆26Updated 6 years ago
- ☆25Updated 7 years ago
- HTTP Header Analysis Vulnerability Tool☆114Updated 4 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆86Updated 2 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Nmap Script to scan for Winnti infections☆70Updated 6 years ago
- Truehunter☆31Updated 3 years ago
- Offline CVE Search utility.☆17Updated 7 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Express security essentials deployment for Linux Servers☆59Updated 4 years ago
- Web Sight Docker Deployment☆124Updated 7 years ago
- Extreme Vulnerable Node Application☆96Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 8 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆109Updated 7 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 7 years ago