Skip to content
This repository has been archived by the owner on Mar 28, 2023. It is now read-only.

trailofbits/deceptiveidn

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Deceptive IDN

Phishers are still using Internationalized Domain Names to trick users. This project uses computer vision to automatically check if IDNs have a deceptive reading.

Usage

To use the tool, invoke it with python3.

$ python3 deceptiveidn.py xn--e1awd7f.com
IDN: еріс.com (xn--e1awd7f.com)
	Deceptive IDN, possible readings:
	- cpic.com 207.235.47.22
	- epic.com 199.204.56.88

Dependencies

This script requires python3, pillow (the python3 imaging library), and tesseract-ocr.

$ brew install python3 tesseract
$ pip3 install pillow

License

This project copyright Ryan Stortz (@withzombies) and is available under the Apache 2.0 LICENSE.

About

Use computer vision to determine if an IDN can be interpreted as something it's not

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages