Chrome extension for detecting phishing web sites
-
Updated
Oct 2, 2020 - Python
Chrome extension for detecting phishing web sites
A collection of unified blocklists designed to provide complete filtering capabilities for different online threats. These blocklists are curated from multiple sources, offering a robust solution for blocking ads, malware, trackers, and other unwanted content.
Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.
ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incident response. Built with Python and scikit-learn.
This is the official code for the paper "Virus: Harmful Fine-tuning Attack for Large Language Models Bypassing Guardrail Moderation"
This is the official code for the paper "Lazy Safety Alignment for Large Language Models against Harmful Fine-tuning" (NeurIPS2024)
Python script that use AbuseIPDB API to bulk check IP reputation for threats. Supports both command line and GUI interfaces. Input options include single IP, subnet, or file. Generates detailed reports and is configurable via settings file
An automated tool that is able to deauthorize a legitimate controller that's controlling a E58Pro drone, then allow control to be passed to an Xbox 360 controller to assume control.
Remake Of The USB Rubber Ducky In Python With Better Features. Steals IPv4+IPv6 And Other IPs, And Browsing History From: Brave, Microsoft Edge, Opera, Google Chrome, Firefox. And System Info, And Computer Component Infos As Well. Has New Editions Available!
This repository consolidates all unique IOCs ever released at rstthreats. Updated at least once a day.
📲 Evil Phone Charging Station
SignHere is implementation of CVE-2017-11882. SignHere is builder of malicious rtf document and VBScript payloads.
A Simple Python Ransomware based on RSA Symmetric Cryptography
APASS ARYX is a reverse engineering and APK analysis framework for exposing malicious behavior in Android apps
Generate Malicious QR Codes
Designed Malicious Activities, Codes and Templates
A Simplistic SSH HoneyPot With AbuseIPDB Reporting
Add a description, image, and links to the malicious topic page so that developers can more easily learn about it.
To associate your repository with the malicious topic, visit your repo's landing page and select "manage topics."