A collection of static files maintained by the Sublime team, primarily used for phishing defense.
☆95Mar 12, 2026Updated last week
Alternatives and similar repositories for static-files
Users that are interested in static-files are comparing it to the libraries listed below
Sorting:
- A command-line tool and module for the free Sublime Analysis API☆16Jun 18, 2024Updated last year
- ☆10Jan 22, 2025Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆352Updated this week
- Python3 interface for the EmailRep API☆55Jan 22, 2021Updated 5 years ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆250Mar 10, 2026Updated last week
- emailrep.io Public API☆353Mar 16, 2024Updated 2 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- Jupyter demo repository for PancakesCon2020☆16Mar 23, 2020Updated 5 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- ☆21Nov 7, 2023Updated 2 years ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆37Aug 24, 2022Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- A home for detection content developed by the delivr.to team☆72Aug 10, 2025Updated 7 months ago
- ☆22Mar 4, 2025Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Simple Gong MCP server☆28Dec 11, 2025Updated 3 months ago
- GreyNoise Maltego integration and transforms☆19Mar 14, 2023Updated 3 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person o…☆14May 1, 2020Updated 5 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- Automation around Entra ID☆38Jul 21, 2025Updated 8 months ago
- MiniDumpWriteDump behavior modification hook☆50Feb 15, 2021Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A simple script to decrypt stored passwords from Oracle WebLogic Server configuration files☆30Jul 24, 2016Updated 9 years ago
- A modular OSINT honeypot for blue teamers☆342May 2, 2023Updated 2 years ago
- Top 1 Millon ranked websites and top level domains (TLD)☆11Feb 4, 2026Updated last month
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 2 years ago
- A Python package and command line utility for scanning emails with YARA rules☆21Jan 23, 2026Updated last month
- Eternalblue-Doublepulsar without Metasploit or python☆53May 30, 2019Updated 6 years ago
- ☆27Aug 25, 2020Updated 5 years ago