A collection of static files maintained by the Sublime team, primarily used for phishing defense.
☆95Updated this week
Alternatives and similar repositories for static-files
Users that are interested in static-files are comparing it to the libraries listed below
Sorting:
- A command-line tool and module for the free Sublime Analysis API☆16Jun 18, 2024Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆348Updated this week
- ☆10Jan 22, 2025Updated last year
- emailrep.io Public API☆352Mar 16, 2024Updated last year
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- Python3 interface for the EmailRep API☆55Jan 22, 2021Updated 5 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- An async Python client library for Empire's RESTful API☆26Dec 6, 2023Updated 2 years ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆247Updated this week
- Using a Google a Programmable Search Engine to make custom Digital Business Card Search Engine☆10Oct 4, 2022Updated 3 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 2 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- gpocheck☆30Aug 11, 2024Updated last year
- ☆13Apr 8, 2022Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- ☆29Nov 13, 2020Updated 5 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- 2021 Machine Learning Security Evasion Competition☆13Sep 29, 2021Updated 4 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- Simple Python 3 web crawler☆13Jan 23, 2020Updated 6 years ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆22Apr 15, 2016Updated 9 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- PhishReporter Outlook Add-In in an Outlook Add-In that allows users to report phishing e-mails to a specific e-mail address for further p…☆35Jan 25, 2017Updated 9 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆13May 18, 2021Updated 4 years ago
- Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, Microsoft Azure, and Digital Ocean simultaneousl…☆18Jan 15, 2025Updated last year
- Orthos is a machine administration tool.☆19Aug 19, 2025Updated 6 months ago
- The most relaxed testing framework of Kubernetes in the world☆15Nov 26, 2019Updated 6 years ago
- Automation around Entra ID☆38Jul 21, 2025Updated 7 months ago