Phish Report is currently unavailable as it requires JavaScript and cookies to be enabled in your browser to function.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
Python tool for monitoring user-select APIs in Android apps using Frida.
An Active Defense framework for detecting and responding to phishing attacks in Office 365 Message Trace logs.
PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.
A data-mining and deep web asset search engine for breach analysis and prevention services.
Extract local data storage of an Android application in one click.
A comprehensive collection of wordlists for bruteforcing and password cracking, covering various hashing algorithms and sizes.
An open-source phishing toolkit for businesses and penetration testers.
Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.