Use computer vision to determine if an IDN can be interpreted as something it's not
☆61May 8, 2017Updated 8 years ago
Alternatives and similar repositories for deceptiveidn
Users that are interested in deceptiveidn are comparing it to the libraries listed below
Sorting:
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 5 years ago
- The Seeker of IOC☆131Oct 2, 2020Updated 5 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- ☆36Sep 5, 2017Updated 8 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Sep 21, 2017Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Nov 26, 2017Updated 8 years ago
- Collection of my test rules and Submissions to Emerging-Sigs☆11Apr 22, 2016Updated 9 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- a low-interaction honeypot☆95Jun 4, 2017Updated 8 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 4 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- safe_tools☆26Nov 27, 2017Updated 8 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- 将自动爬虫的结果判断是否属于hooks,并不断抓取url爬啊爬。☆30Jun 2, 2017Updated 8 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 9 years ago
- ☆30May 23, 2017Updated 8 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 5 months ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago