AI-powered phishing & threat-analysis platform to automatically inspect, classify, and report suspicious emails, files, URLs, IPs, and hashes built for teams and organizations
☆81Apr 30, 2026Updated this week
Alternatives and similar repositories for suspicious
Users that are interested in suspicious are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MuonFP is an enterprise ready, TCP passive fingerprinter written in Rust that has no external dependencies such as WireShark or other ope…☆29Mar 27, 2026Updated last month
- Download a demo version of Open Network Insight, which can be run standalone on a windows laptop using Winpython https://sourceforge.net/…☆10Feb 1, 2017Updated 9 years ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,273Updated this week
- MISP to Microsoft Defender integration☆17Feb 24, 2026Updated 2 months ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆18Dec 8, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆22May 27, 2025Updated 11 months ago
- IOC/Hash scanner and IDS layer 4 designed to be portable and fast☆27Jan 28, 2026Updated 3 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆512Updated this week
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- External C2 is a specification to allow third-party programs to act as a communication layer for Cobalt Strike’s Beacon payload.☆18Jul 17, 2025Updated 9 months ago
- The Stratosphere IPS is a free software IPS that uses network behavior to detect and block malicious actions.☆33May 24, 2016Updated 9 years ago
- Files used for various testing methodologies.☆12Apr 15, 2026Updated 3 weeks ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ruby bindings for IMDb using imdbapi.com as source☆21Dec 8, 2011Updated 14 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆13Sep 17, 2025Updated 7 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆14Jan 15, 2025Updated last year
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- AI-based implant feature☆25Apr 28, 2025Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆77Apr 4, 2025Updated last year
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.☆40Aug 27, 2025Updated 8 months ago
- Cortex Analyzers Repository☆483Apr 14, 2026Updated 3 weeks ago
- A collection of OSINT websites and tools to aid penetration testers with their info gathering tasks☆17Oct 27, 2024Updated last year
- it's popular to keep reference lists on github☆13May 2, 2022Updated 4 years ago
- Traverse HDFS without jvm startup delays and directory context!! Supports multiple HDFS hosts, command line history and tab completion.☆17May 20, 2016Updated 9 years ago
- ☆29Nov 25, 2025Updated 5 months ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆11Jun 9, 2020Updated 5 years ago
- OpenPhish Community Phishing Feed☆25Updated this week
- My personal PowerShell profile☆16Dec 5, 2016Updated 9 years ago
- AWS CloudFormation templates for the blog post regarding Defense in Depth using AWS Managed Rules☆10Aug 17, 2020Updated 5 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Use your cookies from browsers in your curl, wget and httpie requests!☆19Apr 22, 2026Updated 2 weeks ago
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆19Apr 30, 2025Updated last year