phishai / phish-protect
Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.
☆116Updated 6 years ago
Alternatives and similar repositories for phish-protect:
Users that are interested in phish-protect are comparing it to the libraries listed below
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆151Updated 4 years ago
- Public crawler and data from Tripwire: Inferring Internet Site Compromise☆96Updated 7 years ago
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- ☆56Updated 7 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 8 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- A service for monitoring whether chat apps etc. leak URLs☆56Updated 6 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Artifacts for the USENIX publication.☆57Updated 5 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- Google Chrome extension implementing JavaScript Zero☆149Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- The Digital First Aid Kit has moved to Gitlab:☆109Updated 5 years ago
- A Github organization reconnaissance tool.☆216Updated last year
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆159Updated 8 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- ☆25Updated 7 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 8 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Nmap Script to scan for Winnti infections☆70Updated 6 years ago
- Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.☆58Updated 4 years ago
- WANNAFIX is a mitigation script for the recent WANNACRY Ransomware attack☆53Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- docker based telnet honeypot☆80Updated 6 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- ☆25Updated 7 years ago