phishai / phish-protectLinks
Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.
☆118Updated 7 years ago
Alternatives and similar repositories for phish-protect
Users that are interested in phish-protect are comparing it to the libraries listed below
Sorting:
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- ☆56Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Tool to disable Intel AMT on Windows☆144Updated 8 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆176Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆89Updated 3 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 8 years ago
- Repo for autosnort scripts.☆157Updated 5 years ago
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 7 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- Shodan Firefox Add-on☆153Updated 4 years ago
- ☆146Updated 9 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆120Updated 3 years ago
- Repository of my Computer and Information Security work.☆67Updated 7 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆144Updated 2 years ago
- A simple command-line script to interact with the virustotal-api☆61Updated 7 years ago
- DNS zone transfer research☆59Updated 8 years ago
- Public crawler and data from Tripwire: Inferring Internet Site Compromise☆96Updated 7 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆125Updated 7 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Updated 2 years ago
- This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script rem…☆101Updated 3 years ago
- A collection of scripts that help handling X.509 certificate and TLS issues☆129Updated last week