rishy / phishing-websites
Identifies phishing websites using a treebag model
☆22Updated 4 years ago
Alternatives and similar repositories for phishing-websites:
Users that are interested in phishing-websites are comparing it to the libraries listed below
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- ☆33Updated 8 years ago
- ☆12Updated 7 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 7 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- ☆21Updated 9 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 8 years ago
- ☆46Updated 7 years ago
- Local Transform Wrapper for Maltego☆11Updated 8 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- ☆22Updated 7 years ago
- Code, commands, and chatter about Threat Hunting.☆35Updated 5 years ago
- Mixing up CVE and MS like a pro☆24Updated 7 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Maltese - Malware Traffic Emulator☆26Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Files from Zeronights presentation.☆28Updated 12 years ago
- Packet Acumen☆19Updated 10 years ago
- Automatically scans for malicious proxies.☆29Updated 9 years ago
- Simple DDE object detector☆56Updated 7 years ago
- ☆79Updated 2 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- Peach Fuzzer Web Frontend☆52Updated 3 years ago
- Easily write tests and fuzz many different programs.☆12Updated 2 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago