phishai / phish-protect
Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.
☆118Updated 6 years ago
Alternatives and similar repositories for phish-protect:
Users that are interested in phish-protect are comparing it to the libraries listed below
- ☆25Updated 7 years ago
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 8 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆112Updated 8 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆131Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Nmap Script to scan for Winnti infections☆70Updated 6 years ago
- ☆25Updated 7 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- Truehunter☆31Updated 3 years ago
- A tool to speed up the process of doing the same simple IP/Domain Name lookups over and over again.☆67Updated 6 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆119Updated 2 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 7 years ago
- Detect and prevent crypto malware as it encrypts files☆69Updated 3 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆86Updated 2 years ago
- Detect and prevent KRACK attacks in your network☆181Updated 7 years ago
- DNS zone transfer research☆59Updated 8 years ago