All Projects → PhishingKit-Yara-Search → Similar Projects or Alternatives

213 Open source projects that are alternatives of or similar to PhishingKit-Yara-Search

PhishingKit-Yara-Rules
Repository of Yara rules dedicated to Phishing Kits Zip files
Stars: ✭ 71 (+195.83%)
Judge-Jury-and-Executable
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (+175%)
Mutual labels:  yara, yara-rules, yara-scanner
shark
Best Tool For Phishing, Future Of Phishing
Stars: ✭ 238 (+891.67%)
Mutual labels:  phishing, phishing-sites, phishing-kit
TweetFeed
Collecting IOCs posted on Twitter
Stars: ✭ 181 (+654.17%)
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+2716.67%)
Mutual labels:  phishing, phishing-detection
threat-intel
Signatures and IoCs from public Volexity blog posts.
Stars: ✭ 130 (+441.67%)
Mutual labels:  yara, yara-rules
Skeleton
Skeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (+83.33%)
Mutual labels:  phishing, phishing-sites
yara-forensics
Set of Yara rules for finding files using magics headers
Stars: ✭ 115 (+379.17%)
Mutual labels:  yara, yara-rules
yarasploit
YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.
Stars: ✭ 31 (+29.17%)
Mutual labels:  yara, yara-rules
Hyara
Yara rule making tool (IDA Pro & Binary Ninja & Cutter Plugin)
Stars: ✭ 142 (+491.67%)
Mutual labels:  yara, yara-rules
yara-validator
Validates yara rules and tries to repair the broken ones.
Stars: ✭ 37 (+54.17%)
Mutual labels:  yara, yara-rules
Malicious-Urlv5
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (+45.83%)
Mutual labels:  phishing, phishing-detection
Phishing-Email-Analysis
Useful resources about phishing email analysis
Stars: ✭ 46 (+91.67%)
Mutual labels:  phishing, phishing-detection
pyarascanner
A simple many-rules to many-files YARA scanner for incident response or malware zoos.
Stars: ✭ 23 (-4.17%)
Mutual labels:  yara, yara-scanner
PEiD
Yet another implementation of PEiD with yara
Stars: ✭ 12 (-50%)
Mutual labels:  yara, yara-rules
redlure-console
Distributed phishing framework designed to streamline offensive security phishing
Stars: ✭ 24 (+0%)
Mutual labels:  phishing-kit, phishing-detection
YaraStation
Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centralized management solution that facilitates result investigation and easier scanning capabilities.
Stars: ✭ 25 (+4.17%)
Mutual labels:  yara-rules, yara-scanner
factual-rules-generator
Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.
Stars: ✭ 62 (+158.33%)
Mutual labels:  yara, yara-rules
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+229.17%)
Mutual labels:  phishing, phishing-detection
pentesting-framework
Pentesting Framework is a bundle of penetration testing tools, Includes - security, pentesting, hacking and many more.
Stars: ✭ 90 (+275%)
Mutual labels:  phishing-sites, phishing-kit
yara-rules
Yara rules written by me, for free use.
Stars: ✭ 13 (-45.83%)
Mutual labels:  yara, yara-rules
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (+95.83%)
Mutual labels:  phishing, phishing-sites
Analyzer
🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (+350%)
Mutual labels:  phishing, yara
Loki
Loki - Simple IOC and Incident Response Scanner
Stars: ✭ 2,217 (+9137.5%)
Mutual labels:  yara, yara-rules
static file analysis
Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
Stars: ✭ 34 (+41.67%)
Mutual labels:  yara, yara-rules
ThreatKB
Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)
Stars: ✭ 68 (+183.33%)
Mutual labels:  yara, yara-rules
YaraSharp
C# wrapper around the Yara pattern matching library
Stars: ✭ 29 (+20.83%)
Mutual labels:  yara, yara-scanner
TR-PhishingList
Türkiye'ye Yönelik Zararlı Bağlantı Erişim Engelleme Listesi
Stars: ✭ 68 (+183.33%)
Mutual labels:  phishing, phishing-detection
VisualBasicObfuscator
Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.
Stars: ✭ 115 (+379.17%)
Mutual labels:  phishing
InfoPhish
InfoPath Phishing Repo Resource
Stars: ✭ 68 (+183.33%)
Mutual labels:  phishing
18-plus-Facebook-Phishing
18+Facebook-Phishing.Hack Facebook
Stars: ✭ 58 (+141.67%)
Mutual labels:  phishing
ApeX
Using Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (+262.5%)
Mutual labels:  phishing
vim-syntax-yara
A Vim syntax-highlighting file for YARA rules
Stars: ✭ 26 (+8.33%)
Mutual labels:  yara
detection
Detection in the form of Yara, Snort and ClamAV signatures.
Stars: ✭ 70 (+191.67%)
Mutual labels:  yara
Hades
The best way to hack into VMware accounts.
Stars: ✭ 61 (+154.17%)
Mutual labels:  phishing
Dark-Phish
Dark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (+137.5%)
Mutual labels:  phishing
GoPhish-Templates
GoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (+216.67%)
Mutual labels:  phishing
Phishing-Dataset
Phishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing-Dataset/
Stars: ✭ 21 (-12.5%)
Mutual labels:  phishing
yara
Malice Yara Plugin
Stars: ✭ 27 (+12.5%)
Mutual labels:  yara
Social-Fish-v2.0
Phishing Tool
Stars: ✭ 24 (+0%)
Mutual labels:  phishing
Blackeye-for-Windows
This is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…
Stars: ✭ 38 (+58.33%)
Mutual labels:  phishing
wifimitm
Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Stars: ✭ 49 (+104.17%)
Mutual labels:  phishing
uzen
Website crawler with YARA detection
Stars: ✭ 84 (+250%)
Mutual labels:  yara
YaraHunts
Random hunting ordiented yara rules
Stars: ✭ 86 (+258.33%)
Mutual labels:  yara-rules
Phishious
An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
Stars: ✭ 397 (+1554.17%)
Mutual labels:  phishing
termux-wifi
Bash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: ✭ 406 (+1591.67%)
Mutual labels:  phishing
Ravana
Phishing tool for termux .This includes many websites like facebook,Instagram,Twitter,google etc..
Stars: ✭ 68 (+183.33%)
Mutual labels:  phishing-sites
nlc-email-phishing
Detect email phishing with Watson Natural Language Classifier
Stars: ✭ 26 (+8.33%)
Mutual labels:  phishing-detection
Facebook-phishing
Phishing Facebook Page in Django Code(Python Based)
Stars: ✭ 129 (+437.5%)
Mutual labels:  phishing
yara-exporter
Exporting MISP event attributes to yara rules usable with Thor apt scanner
Stars: ✭ 22 (-8.33%)
Mutual labels:  yara
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (+75%)
Mutual labels:  phishing
whohk
whohk,linux下一款强大的应急响应工具 在linux下的应急响应往往需要通过繁琐的命令行来查看各个点的情况,有的时候还需要做一些格式处理,这对于linux下命令不是很熟悉的人比较不友好。本工具将linux下应急响应中常用的一些操作给集合了起来,并处理成了较为友好的格式,只需要通过一个参数就能代替繁琐复杂的命令来实现对各个点的检查。
Stars: ✭ 260 (+983.33%)
Mutual labels:  yara
trailofphish
Phishing e-mail repository
Stars: ✭ 33 (+37.5%)
Mutual labels:  phishing
TgaHacking
Social Media Hacking & Information Tool
Stars: ✭ 71 (+195.83%)
Mutual labels:  phishing
yara-parser
Tools for parsing rulesets using the exact grammar as YARA. Written in Go.
Stars: ✭ 69 (+187.5%)
Mutual labels:  yara
Isthislegit
Dashboard to collect, analyze, and respond to reported phishing emails.
Stars: ✭ 251 (+945.83%)
Mutual labels:  phishing
nero-phishing-server
An full HTTP server for Phishing. Downloads recursively the entire webpage.
Stars: ✭ 108 (+350%)
Mutual labels:  phishing
URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+320.83%)
Mutual labels:  phishing-kit
binlex
A Binary Genetic Traits Lexer Framework
Stars: ✭ 303 (+1162.5%)
Mutual labels:  yara
I See You
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+925%)
Mutual labels:  phishing
1-60 of 213 similar projects