rishy / phishing-websitesLinks
Identifies phishing websites using a treebag model
☆22Updated 5 years ago
Alternatives and similar repositories for phishing-websites
Users that are interested in phishing-websites are comparing it to the libraries listed below
Sorting:
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 7 years ago
- ☆12Updated 8 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 8 years ago
- ☆33Updated 9 years ago
- Vulners signature-base software version detection rules☆38Updated 4 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- ☆42Updated 3 years ago
- ☆21Updated 10 years ago
- A malware/botnet analysis framework written in Ruby.☆195Updated 2 years ago
- Source Code Intelligence☆30Updated 8 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- Some Of Huawei Routers Exploits☆13Updated 9 years ago
- Break Apps with Frida workshop material☆46Updated 8 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Updated 9 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 8 years ago
- defplorex for BlackHat Arsenal☆115Updated 8 years ago
- ☆46Updated 8 years ago
- Subdomain Analyzer☆77Updated 8 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Normalizer for honeypot data.☆11Updated 2 years ago
- ☆79Updated 3 years ago
- OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.☆97Updated 11 years ago
- ☆37Updated 10 years ago
- ☆53Updated 10 years ago
- _Working_ examples from Grayhat Python☆14Updated 10 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Simple DDE object detector☆56Updated 8 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Updated 9 years ago
- Exploits, Fuzzers, Scripts etc☆34Updated this week