ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+852.11%)
TR-PhishingListTürkiye'ye Yönelik Zararlı Bağlantı Erişim Engelleme Listesi
Stars: ✭ 68 (-4.23%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+11.27%)
Analyzer🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (+52.11%)
sharkBest Tool For Phishing, Future Of Phishing
Stars: ✭ 238 (+235.21%)
redlure-consoleDistributed phishing framework designed to streamline offensive security phishing
Stars: ✭ 24 (-66.2%)
TweetFeedCollecting IOCs posted on Twitter
Stars: ✭ 181 (+154.93%)
Malicious-Urlv5A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (-50.7%)
yara-forensicsSet of Yara rules for finding files using magics headers
Stars: ✭ 115 (+61.97%)
Dark-PhishDark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (-19.72%)
yara-validatorValidates yara rules and tries to repair the broken ones.
Stars: ✭ 37 (-47.89%)
yara-rustRust bindings for VirusTotal/Yara
Stars: ✭ 35 (-50.7%)
pentesting-frameworkPentesting Framework is a bundle of penetration testing tools, Includes - security, pentesting, hacking and many more.
Stars: ✭ 90 (+26.76%)
detectionDetection in the form of Yara, Snort and ClamAV signatures.
Stars: ✭ 70 (-1.41%)
yara-parserTools for parsing rulesets using the exact grammar as YARA. Written in Go.
Stars: ✭ 69 (-2.82%)
ImHex-PatternsHex patterns, include patterns and magic files for the use with the ImHex Hex Editor
Stars: ✭ 192 (+170.42%)
moleYara powered NIDS with high speed packet capture powered by PF_RING
Stars: ✭ 51 (-28.17%)
PhishruffusIntelligent threat hunter and phishing servers
Stars: ✭ 44 (-38.03%)
VisualBasicObfuscatorVisual Basic Code universal Obfuscator intended to be used during penetration testing assignments.
Stars: ✭ 115 (+61.97%)
FunnelFunnel is a lightweight yara-based feed scraper
Stars: ✭ 38 (-46.48%)
OpenDKIMNo description or website provided.
Stars: ✭ 58 (-18.31%)
SkeletonSkeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (-38.03%)
ApeXUsing Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (+22.54%)
threat-intelSignatures and IoCs from public Volexity blog posts.
Stars: ✭ 130 (+83.1%)
nlc-email-phishingDetect email phishing with Watson Natural Language Classifier
Stars: ✭ 26 (-63.38%)
HadesThe best way to hack into VMware accounts.
Stars: ✭ 61 (-14.08%)
PhlexishAdvanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk
Stars: ✭ 49 (-30.99%)
yaraMalice Yara Plugin
Stars: ✭ 27 (-61.97%)
gophish-cliGophish Python cli to perform huge phishing campaigns
Stars: ✭ 38 (-46.48%)
Facebook-phishingPhishing Facebook Page in Django Code(Python Based)
Stars: ✭ 129 (+81.69%)
YaraSharpC# wrapper around the Yara pattern matching library
Stars: ✭ 29 (-59.15%)
TgaHackingSocial Media Hacking & Information Tool
Stars: ✭ 71 (+0%)
binlexA Binary Genetic Traits Lexer Framework
Stars: ✭ 303 (+326.76%)
nero-phishing-serverAn full HTTP server for Phishing. Downloads recursively the entire webpage.
Stars: ✭ 108 (+52.11%)
VirusX5The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-78.87%)
S1EMThis project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (+280.28%)
InfoPhishInfoPath Phishing Repo Resource
Stars: ✭ 68 (-4.23%)
Phishing-DatasetPhishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing-Dataset/
Stars: ✭ 21 (-70.42%)
vim-syntax-yaraA Vim syntax-highlighting file for YARA rules
Stars: ✭ 26 (-63.38%)
HyaraYara rule making tool (IDA Pro & Binary Ninja & Cutter Plugin)
Stars: ✭ 142 (+100%)
URL-obfuscatorPython Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+42.25%)
Blackeye-for-WindowsThis is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…
Stars: ✭ 38 (-46.48%)
dnstwisterDomain name permutation as a service
Stars: ✭ 46 (-35.21%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (+7.04%)
trailofphishPhishing e-mail repository
Stars: ✭ 33 (-53.52%)
scam-linksCollection of phishing and malicious links that focuses on Steam and Discord scams.
Stars: ✭ 118 (+66.2%)
wifimitmWi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Stars: ✭ 49 (-30.99%)
r2yarar2yara - Module for Yara using radare2 information
Stars: ✭ 30 (-57.75%)
uzenWebsite crawler with YARA detection
Stars: ✭ 84 (+18.31%)
swisscheeseExploits for YARA 3.7.1 & 3.8.1
Stars: ✭ 26 (-63.38%)
PhishiousAn open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
Stars: ✭ 397 (+459.15%)
termux-wifiBash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: ✭ 406 (+471.83%)
factual-rules-generatorFactual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.
Stars: ✭ 62 (-12.68%)
python-icap-yaraAn ICAP Server with yara scanner for URL and content.
Stars: ✭ 50 (-29.58%)
365-Stealer365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Stars: ✭ 200 (+181.69%)