rishy / phishing-websitesView external linksLinks
Identifies phishing websites using a treebag model
☆22Oct 14, 2020Updated 5 years ago
Alternatives and similar repositories for phishing-websites
Users that are interested in phishing-websites are comparing it to the libraries listed below
Sorting:
- Incident Notification Platform by @NC3-LU☆11Updated this week
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 4 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 5 months ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- A preservation experiment to save photos from Flickr to your disk with the metadata embedded.☆17Mar 23, 2025Updated 10 months ago
- ☆12Jun 24, 2017Updated 8 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Feb 9, 2018Updated 8 years ago
- Gandcrab v5.2 decryption scripts☆16Jan 10, 2020Updated 6 years ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Feb 16, 2018Updated 7 years ago
- Turn an image into a sequence of sounds using a Hilbert Curve.☆14Feb 12, 2023Updated 3 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- ☆16Mar 10, 2017Updated 8 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Dec 2, 2025Updated 2 months ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 9 months ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- FLARM receiver for GNU Radio☆30Jan 30, 2024Updated 2 years ago
- ☆18May 22, 2024Updated last year
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Stop the Steal / J6 Twitter user profiles☆21Jan 6, 2022Updated 4 years ago
- An open source software directory and release tracker.☆25Feb 4, 2026Updated last week
- Capture a URL with Playwright☆30Updated this week
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Golang Library to interact with your MISP instance☆22Sep 12, 2019Updated 6 years ago