A tool that detects maliciousness of suspicious links, written in python with <3.
☆15Dec 26, 2022Updated 3 years ago
Alternatives and similar repositories for Malicious_URL_Analyzer
Users that are interested in Malicious_URL_Analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 人工智能检测恶意URL☆29Aug 22, 2020Updated 5 years ago
- Chrome Extension Phishing Detection tool☆12May 31, 2023Updated 2 years ago
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆37Feb 26, 2018Updated 8 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- Search a list of domains on the wayback machine☆15Jun 8, 2019Updated 6 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago
- exifprobe☆13Jul 11, 2022Updated 3 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- This is useful if you are running an investigation to determine the usage of the same username on different social networks.☆12Dec 10, 2020Updated 5 years ago
- SocialNetSpy© is an information gathering tool based on Python. It obtains all the social network profiles and general informations of a …☆11Oct 14, 2022Updated 3 years ago
- a script that is fairly reliable for web OSINT☆12Jul 20, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Extract data from a .git directory.☆15Mar 28, 2023Updated 3 years ago
- Example PoC Code for CVE-2017-5638 | Apache Struts Exploit☆20Mar 12, 2017Updated 9 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- Social media profile aggregator for node.js☆23Jul 30, 2014Updated 11 years ago
- Maltego transform for OpenDNS Investigate API☆12Jan 6, 2015Updated 11 years ago
- A tool library for searching your leaked sourcecode on github☆19Jan 19, 2026Updated 2 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 4 months ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- bug bounty automation☆14Jul 2, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12May 10, 2023Updated 2 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆55Feb 19, 2023Updated 3 years ago
- IPFS☆16Apr 4, 2018Updated 8 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 5 months ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- ☆54Jul 24, 2018Updated 7 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- BugBounty framework with main function to ORGANIZE data and STEPS. So, you don't get lost in your bug bounty hunting. You can find everyt…☆14Jul 8, 2018Updated 7 years ago
- Social Network Profile crawler scripts and Web App: this is evil☆13Apr 6, 2022Updated 4 years ago
- GreyNoise Maltego integration and transforms☆19Mar 14, 2023Updated 3 years ago
- Source code and writeups for all challenges☆16May 29, 2022Updated 3 years ago
- A Dataset for the task of Malicious URL Detection☆20Jan 18, 2018Updated 8 years ago
- The Black Tiger is all in one OSINT Tool, which has the best methods to collect Information about something or someone just by few mouse …☆168Jun 19, 2025Updated 9 months ago
- 🎣 Using deep learning (word level and character level embeddings combined with GRU layers) to detect Phishing using the URL☆19Jul 30, 2020Updated 5 years ago