Phishing detection regex for Blueteams
☆12Dec 27, 2020Updated 5 years ago
Alternatives and similar repositories for phishing_detection
Users that are interested in phishing_detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- bruteforce the admin panel☆15Jun 6, 2018Updated 7 years ago
- ☆15Aug 12, 2013Updated 12 years ago
- SpyEye v1.3 bug exploiter (frm_findftp_sub.php)☆19Sep 19, 2018Updated 7 years ago
- Top 1 Millon ranked websites and top level domains (TLD)☆11Feb 4, 2026Updated last month
- Extension needed for the Magento 2 xCore connector☆13Mar 3, 2026Updated 2 weeks ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Checks if the given emails have been pwned.☆15May 22, 2023Updated 2 years ago
- Collection of Malware Lures☆23Oct 8, 2021Updated 4 years ago
- Better Auth adapter and plugins for Payload CMS☆45Updated this week
- ☆14Mar 10, 2021Updated 5 years ago
- Exposing phishing kits seen from phishunt.io☆266Jun 13, 2025Updated 9 months ago
- ☆12May 20, 2012Updated 13 years ago
- Installation guide for bWAPP on Kali Linux, Ubuntu, and Windows.☆13Sep 23, 2024Updated last year
- An open source platform to support analysts to organise their case and tasks☆128Updated this week
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Board layout☆13Jul 1, 2015Updated 10 years ago
- David Precious's custom SpamAssassin rules☆19Oct 13, 2022Updated 3 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- retro graphics framework☆12Jun 15, 2024Updated last year
- Filter writeups from ctftime.org by CATegories☆14Nov 4, 2019Updated 6 years ago
- Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person o…☆14May 1, 2020Updated 5 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- ⚡️ Streaming torrent client for the web☆16Aug 7, 2019Updated 6 years ago
- A Quine McCluskey solver for minimization of boolean functions☆11Oct 23, 2024Updated last year
- A python script to convert JSON files into Excel, CSV and combine multiple CSV to Single Excel☆22Dec 24, 2019Updated 6 years ago
- A python library for automated exploratory data analysis☆19Feb 2, 2026Updated last month
- 针对虚拟机所使用的虚拟磁盘(virtual disk)进行操作的工具☆11Feb 22, 2021Updated 5 years ago
- We reached an accuracy of 75% in extracting vendors' names from transaction memos based on human-identified patterns☆23Apr 21, 2018Updated 7 years ago
- Framework for backtesting quantitative trading strategies, allowing easy data visualisation, performance comparison and analysis.☆10Oct 20, 2024Updated last year
- Collection of generic YARA rules☆16Updated this week
- A textmode GUI-lib, written completely in managed C#, no native dependencies☆15Oct 19, 2019Updated 6 years ago
- Dinosaur Game plugin for WordPress based on the T-Rex Runner game in Chromium.☆13Jun 5, 2023Updated 2 years ago
- ☆96May 5, 2025Updated 10 months ago
- Check security aspects of a second-level domain name.☆18May 31, 2024Updated last year
- A public dataset containing chord/beat annotation from a music game named 'osu!'.☆11Oct 17, 2017Updated 8 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- Base and recommended kernel configurations. The base configurations are enforced by the VTS and are modified to permit GrapheneOS changes…☆17Dec 4, 2025Updated 3 months ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago