
本文共 1098 字,大约阅读时间需要 3 分钟。
See what sort of trouble users can get in trying to type your domain name. Find lookalike domains that adversaries can use to attack you. Can detect typosquatters, phishing attacks, fraud, and corporate espionage. Useful as an additional source of targeted threat intelligence.
Catch possible phishing domains in near real time by looking for suspicious TLS certificate issuances reported to the via the API. "Suspicious" issuances are those whose domain name scores beyond a certain threshold based on a configuration file.
Official python API for Phish.AI public and private API to detect zero-day phishing websites
Malicious Web sites are a cornerstone of Internet criminal activities. These Web sites contain various unwanted content such as spam-advertised products, phishing sites, dangerous "drive-by" harness that infect a visitor's system with malware. The most influential approaches to the malicious URL problem are manually constructed lists in which all malicious web page`s URLs are listed, as well as users systems that analyze the content or behavior of a Web site as it is visited.
发表评论
最新留言
关于作者
