MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+79.55%)
Mutual labels: phishing, threat-intelligence
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (+481.82%)
Mutual labels: phishing, threat-intelligence
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+7820.45%)
Mutual labels: threat-analysis, threat-intelligence
DnstwistDomain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+7000%)
Mutual labels: phishing, threat-intelligence
DnsmorphDomain name permutation engine written in Go
Stars: ✭ 148 (+236.36%)
Mutual labels: phishing, threat-intelligence
PhishingkithunterFind phishing kits which use your brand/organization's files and image.
Stars: ✭ 177 (+302.27%)
Mutual labels: phishing, threat-intelligence
SkeletonSkeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (+0%)
Mutual labels: phishing, phishing-servers
Phishing catcherPhishing catcher using Certstream
Stars: ✭ 1,232 (+2700%)
Mutual labels: phishing, threat-intelligence
Analyzer🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (+145.45%)
Mutual labels: phishing, threat-intelligence
OpensquatDetection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (+238.64%)
Mutual labels: phishing, threat-intelligence
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+1436.36%)
Mutual labels: phishing, threat-intelligence
docker-mispA (nearly) production ready Dockered MISP
Stars: ✭ 184 (+318.18%)
Mutual labels: threat-intelligence
HadesThe best way to hack into VMware accounts.
Stars: ✭ 61 (+38.64%)
Mutual labels: phishing
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (+72.73%)
Mutual labels: phishing
Phishing-DatasetPhishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing-Dataset/
Stars: ✭ 21 (-52.27%)
Mutual labels: phishing
Blackeye-for-WindowsThis is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…
Stars: ✭ 38 (-13.64%)
Mutual labels: phishing
wifimitmWi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Stars: ✭ 49 (+11.36%)
Mutual labels: phishing