rishy / phishing-websitesLinks
Identifies phishing websites using a treebag model
☆22Updated 5 years ago
Alternatives and similar repositories for phishing-websites
Users that are interested in phishing-websites are comparing it to the libraries listed below
Sorting:
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 7 years ago
- ☆12Updated 8 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- Source Code Intelligence☆30Updated 8 years ago
- ☆33Updated 9 years ago
- A malware/botnet analysis framework written in Ruby.☆197Updated 2 years ago
- defplorex for BlackHat Arsenal☆115Updated 8 years ago
- ☆22Updated 7 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 9 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 9 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 8 years ago
- Exploits, Fuzzers, Scripts etc☆34Updated 4 years ago
- ☆46Updated 8 years ago
- ☆21Updated 10 years ago
- Some Of Huawei Routers Exploits☆13Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- ☆52Updated 10 years ago
- Vulners signature-base software version detection rules☆37Updated 3 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- intel amt honeypot☆18Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- ☆44Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago