phishai / phish-protect
Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.
☆116Updated 6 years ago
Related projects: ⓘ
- ☆226Updated this week
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆150Updated 3 years ago
- Google Chrome extension implementing JavaScript Zero☆148Updated 6 years ago
- Detect and prevent KRACK attacks in your network☆179Updated 6 years ago
- ☆25Updated 7 years ago
- Compare website blocking effectiveness of popular public DNS servers☆46Updated 4 years ago
- Public crawler and data from Tripwire: Inferring Internet Site Compromise☆96Updated 6 years ago
- Artifacts for the USENIX publication.☆57Updated 4 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆158Updated 8 years ago
- Detect silent (unwanted) changes to files on your system☆157Updated 4 years ago
- Monitoring 'DNS' inside the Tor network☆91Updated 7 years ago
- Shodan Firefox Add-on☆151Updated 3 years ago
- Panic button for protection against cold boot attacks☆138Updated 2 years ago
- ☆192Updated this week
- documentation and writing☆42Updated 6 years ago
- ☆51Updated this week
- ☆100Updated this week
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆122Updated 6 years ago
- a low-interaction honeypot☆92Updated 7 years ago
- ☆56Updated 7 years ago
- Stop searching for sample hashes on 10 different sites.☆65Updated 6 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆171Updated 6 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆85Updated 2 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 6 years ago
- ☆138Updated 8 years ago
- ☆55Updated this week
- Linux Memory Cryptographic Keys Extractor☆235Updated last year
- Detection script for the ROBOT vulnerability☆266Updated 2 years ago