Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
-
Updated
Jul 5, 2024 - Python
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
A quick script to spot the usage of Unicode Bidi (bidirectional) characters that could lead to an Invisible Backdoor
Homoglyphs: get similar letters, convert to ASCII, detect possible languages and UTF-8 group.
Given a TLD zone file, PhishCanary extracts International Domain Names (IDNs) that are homoglyphs of specified target domain names.
ᙏáḱє ‡ɘχτ !η ẃɨŧ¢н-ħ∅υѕé ѕ†ɏƖε (Ɛñ9ĺïś♄ & Řᵾśѕ!áη)
This is a project which aims to identify Social-Engineering in the domain of digital-forensics & cyber-security. The first approach is to find an abuse of the graphical-similiarity of strings.
Searches for uregistered typosquatted domain names and uses computer vision to evalutate their fitness.
Add a description, image, and links to the homoglyph topic page so that developers can more easily learn about it.
To associate your repository with the homoglyph topic, visit your repo's landing page and select "manage topics."