All Projects → t4d → PhishingKit-Yara-Search

t4d / PhishingKit-Yara-Search

Licence: GPL-3.0 license
Yara scan Phishing Kit's Zip archive(s)

Programming Languages

python
139335 projects - #7 most used programming language
YARA
70 projects

Projects that are alternatives of or similar to PhishingKit-Yara-Search

PhishingKit-Yara-Rules
Repository of Yara rules dedicated to Phishing Kits Zip files
Stars: ✭ 71 (+195.83%)
Mutual labels:  phishing, yara, phishing-kit, phishing-detection
Judge-Jury-and-Executable
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (+175%)
Mutual labels:  yara, yara-rules, yara-scanner
shark
Best Tool For Phishing, Future Of Phishing
Stars: ✭ 238 (+891.67%)
Mutual labels:  phishing, phishing-sites, phishing-kit
TweetFeed
Collecting IOCs posted on Twitter
Stars: ✭ 181 (+654.17%)
Mutual labels:  phishing, phishing-sites, phishing-detection
pyarascanner
A simple many-rules to many-files YARA scanner for incident response or malware zoos.
Stars: ✭ 23 (-4.17%)
Mutual labels:  yara, yara-scanner
Malicious-Urlv5
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (+45.83%)
Mutual labels:  phishing, phishing-detection
Skeleton
Skeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (+83.33%)
Mutual labels:  phishing, phishing-sites
redlure-console
Distributed phishing framework designed to streamline offensive security phishing
Stars: ✭ 24 (+0%)
Mutual labels:  phishing-kit, phishing-detection
PEiD
Yet another implementation of PEiD with yara
Stars: ✭ 12 (-50%)
Mutual labels:  yara, yara-rules
yara-validator
Validates yara rules and tries to repair the broken ones.
Stars: ✭ 37 (+54.17%)
Mutual labels:  yara, yara-rules
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+229.17%)
Mutual labels:  phishing, phishing-detection
Phishing-Email-Analysis
Useful resources about phishing email analysis
Stars: ✭ 46 (+91.67%)
Mutual labels:  phishing, phishing-detection
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (+95.83%)
Mutual labels:  phishing, phishing-sites
threat-intel
Signatures and IoCs from public Volexity blog posts.
Stars: ✭ 130 (+441.67%)
Mutual labels:  yara, yara-rules
pentesting-framework
Pentesting Framework is a bundle of penetration testing tools, Includes - security, pentesting, hacking and many more.
Stars: ✭ 90 (+275%)
Mutual labels:  phishing-sites, phishing-kit
Analyzer
🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (+350%)
Mutual labels:  phishing, yara
Loki
Loki - Simple IOC and Incident Response Scanner
Stars: ✭ 2,217 (+9137.5%)
Mutual labels:  yara, yara-rules
YaraSharp
C# wrapper around the Yara pattern matching library
Stars: ✭ 29 (+20.83%)
Mutual labels:  yara, yara-scanner
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+2716.67%)
Mutual labels:  phishing, phishing-detection
yara-forensics
Set of Yara rules for finding files using magics headers
Stars: ✭ 115 (+379.17%)
Mutual labels:  yara, yara-rules

PhishingKit-Yara-Search

Yara scan Phishing Kit's Zip archive(s)

PhishingKit-Yara-Search is a tool created to sort/classify grabbed phishing kits zip files (like with StalkPhish). This tool uses Yara rules to search into not deflated zip files. It uses directories and files names contained into zip file raw format to classify the phishing kit with existing Yara rule.

Features

  • Scan zip files directory with several Yara rules
  • Scan one file with several Yara rules
  • Scan one file with one Yara rule

Requirements

Install

Install the requirements

pip3 install -r requirements.txt

Usage

You can find a set of YARA rules dedicated to Phishing Kits zip files in the tests/rules/ directory.

Help

$ ./PhishingKit-Yara-Search.py -h

    ____  __ __  __  __                      _____                      __  
   / __ \/ // /  \ \/ /___ __________ _     / ___/___  ____ ___________/ /_ 
  / /_/ / //_/____\  / __ `/ ___/ __ `/_____\__ \/ _ \/ __ `/ ___/ ___/ __ \
 / ____/ /\ \_____/ / /_/ / /  / /_/ /_____/__/ /  __/ /_/ / /  / /__/ / / /
/_/   /_/  \_\   /_/\__,_/_/   \__,_/     /____/\___/\__,_/_/   \___/_/ /_/ 

-= PhishingKit Yara Search - Classify phishing kits zip files with Yara rules - v0.2.0 =-

usage: PhishingKit-Yara-Search.py [-h] [-c CONFIGURATION] [-f FILE] [-r RULE]
                                  [-D DIRECTORY] [-v]

Phishing kits Zip files Yara checker

optional arguments:
  -h, --help            show this help message and exit
  -c CONFIGURATION, --configuration CONFIGURATION
                        Configuration file to use
  -f FILE, --file FILE  File to check
  -r RULE, --rule RULE  Use specific Yara rule
  -D DIRECTORY, --directory DIRECTORY
                        Recursive search into directory
  -v, --verbose         Verbose

Configuration file

I invite you to read the conf/example.conf file for precise tuning configuration. Configurable parameters are:

  • yara_rules_dir: directory where your Yara rules (.yar files) are stored
  • yara_compiled: directory where your Yara compiled rules are stored (default: /tmp/yara_rules_compiled)
  • archivesDir_to_analyse: the default directory to scan

Yara rule example

This rule detect PayPal Phishing kit, named H3ATSTR0K3, testing for some specific files and directory presence:

rule PK_PayPal_H3ATSTR0K3 : PayPal
{
    meta:
        description = "Phishing Kit impersonating PayPal"
        licence = "GPL-3.0"
        author = "Thomas 'tAd' Damonneville"
        reference = ""
        date = "2019-11-28"
        comment = "Phishing Kit - PayPal - H3ATSTR0K3"

    strings:
        // the zipfile working on
        $zip_file = { 50 4b 03 04 }
        // specific directory found in PhishingKit
        $spec_dir = "prevents"
        // specific file found in PhishingKit
        $spec_file = "mine.php" nocase
        $spec_file2 = "bcce592108d8ec029aa75f951662de2e.jpeg"
        $spec_file3 = "captured.txt"
        $spec_file4 = "H3ATSTR0K3.txt"

    condition:
        // look for the ZIP header
        uint32(0) == 0x04034b50 and
        // make sure we have a local file header
        $zip_file and
        // check for file
        $spec_file and
        $spec_file2 and
        $spec_file3 and
        $spec_file4 and
        // check for directory
        $spec_dir
}

Usage with configuration file

$ ./PhishingKit-Yara-Search.py -c conf/example.conf   

    ____  __ __  __  __                      _____                      __
   / __ \/ // /  \ \/ /___ __________ _     / ___/___  ____ ___________/ /_
  / /_/ / //_/____\  / __ `/ ___/ __ `/_____\__ \/ _ \/ __ `/ ___/ ___/ __ \
 / ____/ /\ \_____/ / /_/ / /  / /_/ /_____/__/ /  __/ /_/ / /  / /__/ / / /
/_/   /_/  \_\   /_/\__,_/_/   \__,_/     /____/\___/\__,_/_/   \___/_/ /_/

-= PhishingKit Yara Search - Classify phishing kits zip files with Yara rules - v0.2.0 =-    

        file: http__vtennis.vn_forumrunner_PPL-ID.zip
                --> This rule(s) matched: [[PK_PayPal_H3ATSTR0K3]]
        file: http__lazydays.in_cgi_chase.zip
        		--> This rule(s) matched: [[PK_Chase_Xbalti]]
        file: https__35.176.252.80_ourtimes_Ourtime.zip
        		--> This rule(s) matched: [[PK_Ourtime_mmxq]]

Usage with one rule on one file

$ ./PhishingKit-Yara-Search.py -r rules/PK_PayPal_H3ATSTR0K3.yar -f ./http__vtennis.vnforumrunner_PPL-ID.zip

   ____  __ __  __  __                      _____                      __
  / __ \/ // /  \ \/ /___ __________ _     / ___/___  ____ ___________/ /_
 / /_/ / //_/____\  / __ `/ ___/ __ `/_____\__ \/ _ \/ __ `/ ___/ ___/ __ \
/ ____/ /\ \_____/ / /_/ / /  / /_/ /_____/__/ /  __/ /_/ / /  / /__/ / / /
_/   /_/  \_\   /_/\__,_/_/   \__,_/     /____/\___/\__,_/_/   \___/_/ /_/

= PhishingKit Yara Search - Classify phishing kits zip files with Yara rules - v0.2.0 =-                                                                  

       file: ./http__vtennis.vn_forumrunner_PPL-ID.zip                                                                        
               --> This rule(s) matched: [[PK_PayPal_H3ATSTR0K3]]

Usage with one rule on a directory containing several zip files

$ ./PhishingKit-Yara-Search.py -r rules/PK_PayPal_H3ATSTR0K3.yar -D ./dl/

    ____  __ __  __  __                      _____                      __
   / __ \/ // /  \ \/ /___ __________ _     / ___/___  ____ ___________/ /_
  / /_/ / //_/____\  / __ `/ ___/ __ `/_____\__ \/ _ \/ __ `/ ___/ ___/ __ \
 / ____/ /\ \_____/ / /_/ / /  / /_/ /_____/__/ /  __/ /_/ / /  / /__/ / / /
/_/   /_/  \_\   /_/\__,_/_/   \__,_/     /____/\___/\__,_/_/   \___/_/ /_/

-= PhishingKit Yara Search - Classify phishing kits zip files with Yara rules - v0.2.0 =-                                                                  

        file: http__vtennis.vn_forumrunner_PPL-ID.zip
                --> This rule(s) matched: [[PK_PayPal_H3ATSTR0K3]]
        file: https__investing.co.id_wp-content_upgrade_wp-file-manager-n0k7CF_wp-file-manager_languages_Secure-Mail.zip
                --> This rule(s) matched: [[PK_PayPal_H3ATSTR0K3]]
        file: http__compte-login.com_PayPalfinal.zip
                --> This rule(s) matched: [[PK_PayPal_H3ATSTR0K3]]
        file: http__compte-login.com__PayPal.zip
                --> This rule(s) matched: [[PK_PayPal_H3ATSTR0K3]]

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].