graphsloc
Phishing.Database
graphsloc | Phishing.Database | |
---|---|---|
1 | 5 | |
14 | 1,041 | |
- | - | |
10.0 | 3.6 | |
over 1 year ago | 7 days ago | |
Shell | Shell | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
graphsloc
-
We invested 10% to pay back tech debt; Here's what happened
People talk about tackling tech debt, though I want to see results in the form of reduced/stable lines of code!
The author mentions 180k of code... but did the team actually chipped away at that thanks to "Tech debt Friday"?
https://github.com/kaihendry/graphsloc is how I track projects.
Phishing.Database
-
Pi-Hole blockin gMail and Google account page.
I think this was due to a series of false positives in one of the lists at Phishing Database (phishing-domains-ACTIVE.txt in particular)
-
セキュリティ・キャンプ全国大会 2022 Y4チューター 参加記
I collected the phishing domains from the Phishing.Database, and the legitimate sites from the Whitelist in Ultimate-Hosts-Blacklist.
-
Our site has been reported maliciously for Phishing on phishtank.org, but unable to register to report a false positive
[FALSE-POSITIVE] · Issue #194 · mitchellkrogza/Phishing.Database · GitHub
-
NoScript Site Compromised?
The Phishing URL Blocklist is just a collection of other blocklists. One of them is this one: https://github.com/mitchellkrogza/Phishing.Database The raw list is here: https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-domains-ACTIVE.txt (archive.org link) This contains the noscript.net domain.
-
Source of Active Phishing Links and Malicious Attachments
For some quick starting points, I‘d: - setup a MISP server and feast on the great free feeds from e.g. abuse.ch - Alienvault OTX (and how to pull into MISP: https://otx-misp.readthedocs.io/en/latest/) - https://github.com/mitchellkrogza/Phishing.Database - Malware samples: nice curated collection from Lenny Zeltser: https://zeltser.com/malware-sample-sources/ - focus on "theZoo" - https://bazaar.abuse.ch/browse/ - see the OSINT section: https://learnpracticeandshare.com/awesome-malware-analysis-massive-collection-of-resources/ - https://cofense.com/product-services/phishing-intelligence/ (90 day trial) - Reach out to Project Honeypot
What are some alternatives?
criterion.rs - Statistics-driven benchmarking library for Rust
Malware_Society - This is created for updating Various Viruses, malware, and all! Also new kind for vulnerability and attacks!
TweetFeed - TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
GrimeyPhisher - Phishing Toolkit
scam-links - Collection of phishing and malicious links that focuses on Steam and Discord scams.
whitelist - The whitelist of the Ultimate Hosts Blacklist project, infrastructure and beyond.
noscript - The popular NoScript Security Suite browser extension.
antispam-it - lists to spam a lot of rubbish ... hand-curated to fight spammers and phishing harassing poor italian (domain.it) mailboxes #spamrevenge
steamscamsite - Steam, Dota, CSGO, PUBG Scam Site
FPGAprojects - Verilog Codes for FPGA projects I did back in 2019, including 5 stage pipelined MIPS CPU.
CircuitVerse - CircuitVerse Primary Code Base
FPGAprojects.