phishai / phish-protectView external linksLinks
Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.
☆118Jun 22, 2018Updated 7 years ago
Alternatives and similar repositories for phish-protect
Users that are interested in phish-protect are comparing it to the libraries listed below
Sorting:
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Sep 4, 2015Updated 10 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Oct 5, 2023Updated 2 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- Plugin which enables chai scripts to run inside of x64dbg☆12Jul 10, 2016Updated 9 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- ☆13Sep 3, 2024Updated last year
- Scanner for Regin Virtual Filesystems☆26Jan 20, 2015Updated 11 years ago
- Exploit for w3-total-cache☆17Jan 11, 2013Updated 13 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- Calculate and Track SSL and Domain expiration dates☆16Mar 31, 2020Updated 5 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago
- Injectable DLL that helps with debugging Wibu CodeMeter.☆23Nov 9, 2017Updated 8 years ago
- Model Detect Phishing Website by using Machine Learning for Project Chongluadao☆18Aug 10, 2021Updated 4 years ago
- A toolkit for CTFs☆14May 4, 2018Updated 7 years ago
- LLVM based devirtualization PoC’s.☆21Dec 11, 2021Updated 4 years ago
- A script to automatically list visually indistinguishable permutations of domain names using IDN and punycode.☆21May 29, 2017Updated 8 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- A Gamecube/Wii .DOL loader and Gecko PPC plugin for Hopper Disassembler☆22Jun 29, 2018Updated 7 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Docker Container to take full screenshot of a web page☆24May 23, 2023Updated 2 years ago
- x64dbg Plugin SDK For x86 Assembler☆24Sep 10, 2018Updated 7 years ago
- Plugin adding multi-binary project support to IDA Pro (WIP)☆30Sep 13, 2016Updated 9 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 2 years ago
- Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... …☆26May 30, 2024Updated last year
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- Hardware keylogger dongle with built-in Wi-Fi for live keystroke capture/injection and other fun stuff☆21May 13, 2016Updated 9 years ago
- The grey fox☆25Jun 22, 2016Updated 9 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Mar 22, 2016Updated 9 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- Alfred Workflow to convert hex string to assembly and vice versa☆24Dec 12, 2016Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago