5 most common types of cybercrimes Phishing scams Phishing is one of the main forms of social engineering attacks. Its goal is to trick unsuspecting users into giving away their personal information. Usually, these cybercrimes are committed by impersonating trusted and popular brands by creating fak...
Gophish - Gophish is a powerful, open-source phishing framework that makes it easy to test your organization's exposure to phishing. (Source Code) MIT Go/Docker graph-vl - Identity document verification using Machine Learning and GraphQL. MIT Python/Docker/K8S Habitica - Habit tracker app whic...
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks. Note: This tool does not re...
aThe Elder Scrolls V: Skyrim The Elder Scrolls V: Skyrim[translate] aWe implemented a prototype web browser which can be used as an agent and processes each arriving email for phishing attacks. 我们实施了可以使用作为代理的一台原型浏览器并且处理每到达的电子邮件为phishing的攻击。[translate]...
Google Workspace is built on top of Google’s cloud infrastructure and uses the same levels of security as Google itself. This includes automatic detection of suspicious activity, phishing attempts, and other hacking attempts. As an administrator, Google allows you to set different policies to preve...
1Password also encrypts the entire contents of your vaults. That includes metadata like the website URLs you’ve stored, or vault names. This can help protect against phishing attacks, because an attacker wouldn’t know if they were cracking a vault with credit cards or cookie recipes. ...
- connect to over 18 types of databases (SQL and "NoSQL"), query your data, visualize it and create dashboards. Everything has a URL that can be shared. Slack and HipChat integration. (Demo,Source Code)BSD-2-ClausePython Archiving and Digital Preservation (DP) ...
Security training awareness can help users address the most recent dangers and potential vulnerabilities on the web. Users will be able to identify common security threats such as social engineering attacks, phishing, or the opening of questionable emails. ...
They also monitor each transaction to ensure that there is no identity theft, phishing, fraud or other attacks. You also get email notifications if any unusual activity is detected within your account. PayPal, on the other hand, uses next-level encryption to ensure that your transactions are he...
King Phisher - King Phisher is a tool for testing and promoting user awareness by simulating real world phishing attacks. BSD-3-Clause Python MailyGo - MailyGo is a small tool written in Go that allows to send HTML forms, for example from static websites without a dynamic backend, via ema...