All Projects → Phishingkittracker → Similar Projects or Alternatives

409 Open source projects that are alternatives of or similar to Phishingkittracker

MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-37.3%)
Mutual labels:  phishing, cybersecurity
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (-66.67%)
Mutual labels:  phishing, cybersecurity
Intelmq
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+384.92%)
Mutual labels:  cybersecurity, phishing
domfind
A Python DNS crawler to find identical domain names under different TLDs.
Stars: ✭ 22 (-82.54%)
Mutual labels:  phishing, cybersecurity
goblin
一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+569.84%)
Mutual labels:  phishing, cybersecurity
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+436.51%)
Mutual labels:  phishing, cybersecurity
Malicious-Urlv5
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (-72.22%)
Mutual labels:  phishing, cybersecurity
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-62.7%)
Mutual labels:  phishing, cybersecurity
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (+115.87%)
Mutual labels:  cybersecurity, phishing
Sooty
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (+588.1%)
Mutual labels:  cybersecurity, phishing
Computer Science Resources
A list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+944.44%)
Mutual labels:  cybersecurity
Url Classification
Machine learning to classify Malicious (Spam)/Benign URL's
Stars: ✭ 95 (-24.6%)
Mutual labels:  phishing
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (-11.11%)
Mutual labels:  cybersecurity
King Phisher Templates
Templates for the King Phisher open source phishing campaign toolkit.
Stars: ✭ 119 (-5.56%)
Mutual labels:  phishing
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+8194.44%)
Mutual labels:  cybersecurity
Analyzer
🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (-14.29%)
Mutual labels:  phishing
Awesome Nodejs Security
Awesome Node.js Security resources
Stars: ✭ 1,294 (+926.98%)
Mutual labels:  cybersecurity
Thecollective
The Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-32.54%)
Mutual labels:  cybersecurity
Awesome Malware
💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-14.29%)
Mutual labels:  cybersecurity
Prismatica
Responsive Command and Control System
Stars: ✭ 81 (-35.71%)
Mutual labels:  cybersecurity
Phishing catcher
Phishing catcher using Certstream
Stars: ✭ 1,232 (+877.78%)
Mutual labels:  phishing
Black Widow
GUI based offensive penetration testing tool (Open Source)
Stars: ✭ 124 (-1.59%)
Mutual labels:  cybersecurity
Shodan Dorks
Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-6.35%)
Mutual labels:  cybersecurity
Xsscope
XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.
Stars: ✭ 103 (-18.25%)
Mutual labels:  cybersecurity
Awesome Wifi Security
A collection of awesome resources related to 802.11 security, tools and other things
Stars: ✭ 79 (-37.3%)
Mutual labels:  cybersecurity
Certeagle
Weaponizing Live CT logs for automated monitoring of assets
Stars: ✭ 78 (-38.1%)
Mutual labels:  cybersecurity
Deepsea
DeepSea Phishing Gear
Stars: ✭ 96 (-23.81%)
Mutual labels:  phishing
Virtualseccons
An ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-10.32%)
Mutual labels:  cybersecurity
Zphisher
An automated phishing tool with 30+ templates.
Stars: ✭ 1,321 (+948.41%)
Mutual labels:  phishing
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-3.97%)
Mutual labels:  cybersecurity
Cvebase.com
cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-30.16%)
Mutual labels:  cybersecurity
Black Hat Python
black hat python
Stars: ✭ 109 (-13.49%)
Mutual labels:  cybersecurity
Patrowlhears
PatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-29.37%)
Mutual labels:  cybersecurity
Mwdb Core
Malware repository component for samples & static configuration with REST API interface.
Stars: ✭ 125 (-0.79%)
Mutual labels:  cybersecurity
Rvd
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-30.95%)
Mutual labels:  cybersecurity
Cyberdisc Bot
The bot for the Cyber Discovery Community Discord Server!
Stars: ✭ 108 (-14.29%)
Mutual labels:  cybersecurity
Malice
VirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+894.44%)
Mutual labels:  cybersecurity
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1446.83%)
Mutual labels:  cybersecurity
Whalescan
Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulnerable packages on the container
Stars: ✭ 81 (-35.71%)
Mutual labels:  cybersecurity
Wifiphisher
Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+8100.79%)
Mutual labels:  phishing
Content
Security automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+867.46%)
Mutual labels:  cybersecurity
Walkoff Apps
WALKOFF-enabled applications. #nsacyber
Stars: ✭ 125 (-0.79%)
Mutual labels:  cybersecurity
Azure Sentinel
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Stars: ✭ 1,208 (+858.73%)
Mutual labels:  cybersecurity
Grayfish
light weight phishing framework with 18+ pages.
Stars: ✭ 101 (-19.84%)
Mutual labels:  phishing
Awesome Cybersecurity Blueteam
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+1559.52%)
Mutual labels:  cybersecurity
Awesome Cybersecurity
Curated list of awesome cybersecurity companies and solutions.
Stars: ✭ 77 (-38.89%)
Mutual labels:  cybersecurity
Seed Labs
SEED Labs developed in the last 20 years.
Stars: ✭ 102 (-19.05%)
Mutual labels:  cybersecurity
Rsf
The Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-39.68%)
Mutual labels:  cybersecurity
Domainfuzz
Domain name permutation engine for detecting typo squatting, phishing and corporate espionage
Stars: ✭ 74 (-41.27%)
Mutual labels:  phishing
Bluecommand
Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard
Stars: ✭ 99 (-21.43%)
Mutual labels:  cybersecurity
Ioc Explorer
Explore Indicators of Compromise Automatically
Stars: ✭ 73 (-42.06%)
Mutual labels:  cybersecurity
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-45.24%)
Mutual labels:  cybersecurity
Chatter
internet monitoring osint telegram bot for windows
Stars: ✭ 123 (-2.38%)
Mutual labels:  cybersecurity
Attack Control Framework Mappings
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (-8.73%)
Mutual labels:  cybersecurity
Osint San
Framework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.​
Stars: ✭ 99 (-21.43%)
Mutual labels:  cybersecurity
Phisher
Tool designed for performing various social engineering attacks, for phishing.
Stars: ✭ 66 (-47.62%)
Mutual labels:  phishing
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+6919.05%)
Mutual labels:  cybersecurity
King Phisher
Phishing Campaign Toolkit
Stars: ✭ 1,352 (+973.02%)
Mutual labels:  phishing
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+798.41%)
Mutual labels:  phishing
Blackhat Python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+792.86%)
Mutual labels:  cybersecurity
1-60 of 409 similar projects