phishai / phish-protect
Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.
☆116Updated 6 years ago
Alternatives and similar repositories for phish-protect:
Users that are interested in phish-protect are comparing it to the libraries listed below
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆151Updated 4 years ago
- Detect and prevent KRACK attacks in your network☆181Updated 7 years ago
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- Public crawler and data from Tripwire: Inferring Internet Site Compromise☆96Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Google Chrome extension implementing JavaScript Zero☆150Updated 7 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆172Updated 6 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆159Updated 8 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆85Updated 2 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 8 years ago
- ☆25Updated 7 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆127Updated 6 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆239Updated 8 years ago
- ☆56Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Express security essentials deployment for Linux Servers☆58Updated 4 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- Artifacts for the USENIX publication.☆57Updated 5 years ago
- A service for monitoring whether chat apps etc. leak URLs☆56Updated 6 years ago
- A webshell framework for penetration testers.☆297Updated 10 months ago
- Subdomain Analyzer☆76Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- ☆25Updated 7 years ago