All Projects → ninoseki → Miteru

ninoseki / Miteru

Licence: mit
An experimental phishing kit detection tool

Programming Languages

ruby
36898 projects - #4 most used programming language

Labels

Projects that are alternatives of or similar to Miteru

Fiercephish
FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (+668%)
Mutual labels:  phishing
Zphisher
An automated phishing tool with 30+ templates.
Stars: ✭ 1,321 (+956.8%)
Mutual labels:  phishing
Analyzer
🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (-13.6%)
Mutual labels:  phishing
Shellphish
Phishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest
Stars: ✭ 1,037 (+729.6%)
Mutual labels:  phishing
Domainfuzz
Domain name permutation engine for detecting typo squatting, phishing and corporate espionage
Stars: ✭ 74 (-40.8%)
Mutual labels:  phishing
Deepsea
DeepSea Phishing Gear
Stars: ✭ 96 (-23.2%)
Mutual labels:  phishing
Stinkyphish
Monitor Certificate Transparency Logs For Phishing Domains
Stars: ✭ 25 (-80%)
Mutual labels:  phishing
Etherscamdb
Keep track of all current ethereum scams in a large database
Stars: ✭ 121 (-3.2%)
Mutual labels:  phishing
Phishing catcher
Phishing catcher using Certstream
Stars: ✭ 1,232 (+885.6%)
Mutual labels:  phishing
Wifiphisher
Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+8166.4%)
Mutual labels:  phishing
Pythem
pentest framework
Stars: ✭ 1,060 (+748%)
Mutual labels:  phishing
Phisher
Tool designed for performing various social engineering attacks, for phishing.
Stars: ✭ 66 (-47.2%)
Mutual labels:  phishing
King Phisher
Phishing Campaign Toolkit
Stars: ✭ 1,352 (+981.6%)
Mutual labels:  phishing
Dnstwister
Domain name permutation as a service
Stars: ✭ 36 (-71.2%)
Mutual labels:  phishing
Phish Collect
Python script to hunt phishing kits
Stars: ✭ 113 (-9.6%)
Mutual labels:  phishing
Sooty
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (+593.6%)
Mutual labels:  phishing
Url Classification
Machine learning to classify Malicious (Spam)/Benign URL's
Stars: ✭ 95 (-24%)
Mutual labels:  phishing
Phishingkittracker
Let's track phishing kits to give to research community raw material to study !
Stars: ✭ 126 (+0.8%)
Mutual labels:  phishing
King Phisher Templates
Templates for the King Phisher open source phishing campaign toolkit.
Stars: ✭ 119 (-4.8%)
Mutual labels:  phishing
Grayfish
light weight phishing framework with 18+ pages.
Stars: ✭ 101 (-19.2%)
Mutual labels:  phishing

Miteru

Gem Version Build Status Docker Cloud Build Status CodeFactor Coverage Status

Miteru is an experimental phishing kit detection tool.

How it works

Features

  • [x] Phishing kit detection & collection.
  • [x] Slack notification.
  • [x] Threading.

Installation

gem install miteru

Usage

$ miteru
Commands:
  miteru execute         # Execute the crawler
  miteru help [COMMAND]  # Describe available commands or one specific command
$ miteru help execute
Usage:
  miteru execute

Options:
  [--auto-download], [--no-auto-download]              # Enable or disable auto-download of phishing kits
  [--ayashige], [--no-ayashige]                        # Enable or disable ayashige(ninoseki/ayashige) feed
  [--directory-traveling], [--no-directory-traveling]  # Enable or disable directory traveling
  [--download-to=DOWNLOAD_TO]                          # Directory to download file(s)
                                                       # Default: /tmp
  [--post-to-slack], [--no-post-to-slack]              # Post a message to Slack if it detects a phishing kit
  [--size=N]                                           # Number of urlscan.io's results. (Max: 10,000)
                                                       # Default: 100
  [--threads=N]                                        # Number of threads to use
  [--verbose], [--no-verbose]
                                                       # Default: true

Execute the crawler
$ miteru execute
...
https://dummy1.com: it doesn't contain a phishing kit.
https://dummy2.com: it doesn't contain a phishing kit.
https://dummy3.com: it doesn't contain a phishing kit.
https://dummy4.com: it might contain a phishing kit (dummy.zip).

Using Docker (alternative if you don't install Ruby)

$ docker pull ninoseki/miteru
# ex. auto-download detected phishing kit(s) into host machines's /tmp directory
$ docker run --rm -v /tmp:/tmp ninoseki/miteru execute --auto-download

Configuration

For using --post-to-slack feature, you should set the following environment variables:

  • SLACK_WEBHOOK_URL: Your Slack Webhook URL.
  • SLACK_CHANNEL: Slack channel to post a message (default: "#general").

If you are a urlscan.io Pro user, set your API key as an environment variable URLSCAN_API_KEY.

It enables you to subscribe the urlscan.io phish feed.

Examples

Aasciinema cast

asciicast

Slack notification

img

Alternatives

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].