Judge-Jury-and-ExecutableA file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (+175%)
sharkBest Tool For Phishing, Future Of Phishing
Stars: ✭ 238 (+891.67%)
TweetFeedCollecting IOCs posted on Twitter
Stars: ✭ 181 (+654.17%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+2716.67%)
threat-intelSignatures and IoCs from public Volexity blog posts.
Stars: ✭ 130 (+441.67%)
SkeletonSkeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (+83.33%)
yara-forensicsSet of Yara rules for finding files using magics headers
Stars: ✭ 115 (+379.17%)
yarasploitYaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.
Stars: ✭ 31 (+29.17%)
HyaraYara rule making tool (IDA Pro & Binary Ninja & Cutter Plugin)
Stars: ✭ 142 (+491.67%)
yara-validatorValidates yara rules and tries to repair the broken ones.
Stars: ✭ 37 (+54.17%)
Malicious-Urlv5A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (+45.83%)
pyarascannerA simple many-rules to many-files YARA scanner for incident response or malware zoos.
Stars: ✭ 23 (-4.17%)
PEiDYet another implementation of PEiD with yara
Stars: ✭ 12 (-50%)
redlure-consoleDistributed phishing framework designed to streamline offensive security phishing
Stars: ✭ 24 (+0%)
YaraStationYara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centralized management solution that facilitates result investigation and easier scanning capabilities.
Stars: ✭ 25 (+4.17%)
factual-rules-generatorFactual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.
Stars: ✭ 62 (+158.33%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+229.17%)
pentesting-frameworkPentesting Framework is a bundle of penetration testing tools, Includes - security, pentesting, hacking and many more.
Stars: ✭ 90 (+275%)
yara-rulesYara rules written by me, for free use.
Stars: ✭ 13 (-45.83%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (+95.83%)
Analyzer🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (+350%)
LokiLoki - Simple IOC and Incident Response Scanner
Stars: ✭ 2,217 (+9137.5%)
static file analysisAnalysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
Stars: ✭ 34 (+41.67%)
ThreatKBKnowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)
Stars: ✭ 68 (+183.33%)
YaraSharpC# wrapper around the Yara pattern matching library
Stars: ✭ 29 (+20.83%)
TR-PhishingListTürkiye'ye Yönelik Zararlı Bağlantı Erişim Engelleme Listesi
Stars: ✭ 68 (+183.33%)
VisualBasicObfuscatorVisual Basic Code universal Obfuscator intended to be used during penetration testing assignments.
Stars: ✭ 115 (+379.17%)
InfoPhishInfoPath Phishing Repo Resource
Stars: ✭ 68 (+183.33%)
ApeXUsing Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (+262.5%)
vim-syntax-yaraA Vim syntax-highlighting file for YARA rules
Stars: ✭ 26 (+8.33%)
detectionDetection in the form of Yara, Snort and ClamAV signatures.
Stars: ✭ 70 (+191.67%)
HadesThe best way to hack into VMware accounts.
Stars: ✭ 61 (+154.17%)
Dark-PhishDark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (+137.5%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (+216.67%)
Phishing-DatasetPhishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing-Dataset/
Stars: ✭ 21 (-12.5%)
yaraMalice Yara Plugin
Stars: ✭ 27 (+12.5%)
Blackeye-for-WindowsThis is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…
Stars: ✭ 38 (+58.33%)
wifimitmWi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Stars: ✭ 49 (+104.17%)
uzenWebsite crawler with YARA detection
Stars: ✭ 84 (+250%)
YaraHuntsRandom hunting ordiented yara rules
Stars: ✭ 86 (+258.33%)
PhishiousAn open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
Stars: ✭ 397 (+1554.17%)
termux-wifiBash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: ✭ 406 (+1591.67%)
RavanaPhishing tool for termux .This includes many websites like facebook,Instagram,Twitter,google etc..
Stars: ✭ 68 (+183.33%)
nlc-email-phishingDetect email phishing with Watson Natural Language Classifier
Stars: ✭ 26 (+8.33%)
Facebook-phishingPhishing Facebook Page in Django Code(Python Based)
Stars: ✭ 129 (+437.5%)
yara-exporterExporting MISP event attributes to yara rules usable with Thor apt scanner
Stars: ✭ 22 (-8.33%)
whohkwhohk,linux下一款强大的应急响应工具 在linux下的应急响应往往需要通过繁琐的命令行来查看各个点的情况,有的时候还需要做一些格式处理,这对于linux下命令不是很熟悉的人比较不友好。本工具将linux下应急响应中常用的一些操作给集合了起来,并处理成了较为友好的格式,只需要通过一个参数就能代替繁琐复杂的命令来实现对各个点的检查。
Stars: ✭ 260 (+983.33%)
TgaHackingSocial Media Hacking & Information Tool
Stars: ✭ 71 (+195.83%)
yara-parserTools for parsing rulesets using the exact grammar as YARA. Written in Go.
Stars: ✭ 69 (+187.5%)
IsthislegitDashboard to collect, analyze, and respond to reported phishing emails.
Stars: ✭ 251 (+945.83%)
nero-phishing-serverAn full HTTP server for Phishing. Downloads recursively the entire webpage.
Stars: ✭ 108 (+350%)
URL-obfuscatorPython Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+320.83%)
binlexA Binary Genetic Traits Lexer Framework
Stars: ✭ 303 (+1162.5%)
I See YouISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+925%)