PhishingKitHunter
Phishing hunter
A tool to identify phishing kits by analyzing referer URLs from legitimate websites' logs.
Find phishing kits which use your brand/organization's files and image.
228 stars
16 watching
56 forks
Language: Python
last commit: almost 6 years ago fraud-detectionfraud-preventionphishingphishing-attacksphishing-sitessecuritythreat-analysisthreat-huntingthreat-intelligence
Related projects:
Repository | Description | Stars |
---|---|---|
t4d/phishingkit-yara-rules | Repository of Yara rules for detecting phishing kit zip files | 207 |
viralmaniar/murmurhash | Tools for detecting phishing websites by analyzing favicon hashes and searching on Shodan | 115 |
omergunal/pot | Automated phishing attack simulation tool | 252 |
emalderson/thephish | An automated email analysis tool that uses machine learning and API integrations to identify phishing emails | 1,165 |
octoberfest7/teamsphisher | A tool designed to send phishing messages and attachments to Microsoft Teams users | 1,039 |
gemgeorge/sniperphish | A web-based phishing toolkit designed to simulate real-world attacks for security testing and awareness training. | 561 |
sapphirex00/threat-hunting | A collection of threat intelligence resources and tools for analyzing APT malware | 257 |
gossithedog/threathunting | Tools and rules for detecting malicious domain calls in endpoint malware | 570 |
zerofox-oss/phishpond | A tool for analyzing phishing kits in a contained environment | 44 |
optiv/microsoft365_devicephish | A tool designed to demonstrate a vulnerability in Microsoft's OAuth Authorization Flow for phishing attacks | 94 |
a3sal0n/cyberthreathunting | A collection of tools and resources for threat hunters to identify and respond to cyber threats. | 861 |
threatexpress/domainhunter | Tools for identifying suitable domains for malicious activities | 1,554 |
hadojae/data | Automates phishing analysis by visiting URLs, taking screenshots and scraping archives. | 96 |
beahunt3r/windows-hunting | A collection of tools and resources to aid Windows threat hunters in identifying common security artifacts. | 347 |