All Projects β†’ Phishruffus β†’ Similar Projects or Alternatives

212 Open source projects that are alternatives of or similar to Phishruffus

Phishing catcher
Phishing catcher using Certstream
Stars: ✭ 1,232 (+2700%)
Mutual labels:  phishing, threat-intelligence
Analyzer
πŸ” Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (+145.45%)
Mutual labels:  phishing, threat-intelligence
Opensquat
Detection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (+238.64%)
Mutual labels:  phishing, threat-intelligence
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+7820.45%)
Dnsmorph
Domain name permutation engine written in Go
Stars: ✭ 148 (+236.36%)
Mutual labels:  phishing, threat-intelligence
Stalkphish
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (+481.82%)
Mutual labels:  phishing, threat-intelligence
Skeleton
Skeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (+0%)
Mutual labels:  phishing, phishing-servers
Phishingkithunter
Find phishing kits which use your brand/organization's files and image.
Stars: ✭ 177 (+302.27%)
Mutual labels:  phishing, threat-intelligence
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+79.55%)
Mutual labels:  phishing, threat-intelligence
Dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+7000%)
Mutual labels:  phishing, threat-intelligence
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+1436.36%)
Mutual labels:  phishing, threat-intelligence
GoPhish-Templates
GoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (+72.73%)
Mutual labels:  phishing
Thechoice
The linux choice collection tools
Stars: ✭ 245 (+456.82%)
Mutual labels:  phishing
Pot
Phishing on Twitter
Stars: ✭ 223 (+406.82%)
Mutual labels:  phishing
Macphish
Office for Mac Macro Payload Generator
Stars: ✭ 202 (+359.09%)
Mutual labels:  phishing
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+386.36%)
Mutual labels:  threat-intelligence
Social-Fish-v2.0
Phishing Tool
Stars: ✭ 24 (-45.45%)
Mutual labels:  phishing
Blackeye Python
BlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only
Stars: ✭ 191 (+334.09%)
Mutual labels:  phishing
Socialfish
Phishing Tool & Information Collector
Stars: ✭ 2,522 (+5631.82%)
Mutual labels:  phishing
wifimitm
Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Stars: ✭ 49 (+11.36%)
Mutual labels:  phishing
Umbrella
A Phishing Dropper designed to Pentest.
Stars: ✭ 180 (+309.09%)
Mutual labels:  phishing
Esp8266 wifi captive portal
πŸ”‘ WiFi captive portal for ESP8266 for phishing WiFi passwords
Stars: ✭ 165 (+275%)
Mutual labels:  phishing
SSHapendoes
Capture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-29.55%)
Mutual labels:  threat-intelligence
ThreatIntelligence
Tracking APT IOCs
Stars: ✭ 23 (-47.73%)
Mutual labels:  threat-intelligence
termux-wifi
Bash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: ✭ 406 (+822.73%)
Mutual labels:  phishing
Shark
Future Of Phishing With less delay
Stars: ✭ 150 (+240.91%)
Mutual labels:  phishing
I See You
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+459.09%)
Mutual labels:  phishing
Hades
The best way to hack into VMware accounts.
Stars: ✭ 61 (+38.64%)
Mutual labels:  phishing
Phishmailer
Generate Professional Phishing Emails Fast And Easy
Stars: ✭ 227 (+415.91%)
Mutual labels:  phishing
docker-misp
A (nearly) production ready Dockered MISP
Stars: ✭ 184 (+318.18%)
Mutual labels:  threat-intelligence
Tigershark
Bilingual PhishingKit. TigerShark intergrates a vast array of various phishing tools and frameworks, from C2 servers, backdoors and delivery methods in multiple scripting languages in order to suit whatever your deployment needs may be.
Stars: ✭ 212 (+381.82%)
Mutual labels:  phishing
Phishing-Dataset
Phishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing-Dataset/
Stars: ✭ 21 (-52.27%)
Mutual labels:  phishing
Socialfishmobile
πŸ“± 🐟 An app to remote control SocialFish.
Stars: ✭ 200 (+354.55%)
Mutual labels:  phishing
d4-core
D4 core software (server and sample sensor client)
Stars: ✭ 40 (-9.09%)
Mutual labels:  threat-intelligence
Gitem
A Github organization reconnaissance tool.
Stars: ✭ 190 (+331.82%)
Mutual labels:  phishing
Blackeye-for-Windows
This is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…
Stars: ✭ 38 (-13.64%)
Mutual labels:  phishing
intelligence-icons
intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
Stars: ✭ 32 (-27.27%)
Mutual labels:  threat-intelligence
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (-4.55%)
Mutual labels:  phishing
Recreator Phishing
PROFESSIONAL TOOL ORIENTED IN THE RECREATION OF PHISHING WEBSITES SCENARIOS
Stars: ✭ 136 (+209.09%)
Mutual labels:  phishing
Extra Phishing Pages
Community-built scenarios for Wifiphisher
Stars: ✭ 170 (+286.36%)
Mutual labels:  phishing
Phishious
An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
Stars: ✭ 397 (+802.27%)
Mutual labels:  phishing
Urlcrazy
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (+240.91%)
Mutual labels:  phishing
awesome-malware-analysis
Defund the Police.
Stars: ✭ 9,181 (+20765.91%)
Mutual labels:  threat-intelligence
Miteru
An experimental phishing kit detection tool
Stars: ✭ 125 (+184.09%)
Mutual labels:  phishing
Dragnet
Your Social Engineering Sidekick
Stars: ✭ 139 (+215.91%)
Mutual labels:  phishing
InfoPhish
InfoPath Phishing Repo Resource
Stars: ✭ 68 (+54.55%)
Mutual labels:  phishing
Blackphish
πŸ”± [ Phishing Made Easy ] πŸ”± (In Beta)
Stars: ✭ 133 (+202.27%)
Mutual labels:  phishing
utilities
This repository contains tools used by 401trg.
Stars: ✭ 19 (-56.82%)
Mutual labels:  threat-analysis
malware-persistence
Collection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (+147.73%)
Mutual labels:  threat-intelligence
Phishingkittracker
Let's track phishing kits to give to research community raw material to study !
Stars: ✭ 126 (+186.36%)
Mutual labels:  phishing
ApeX
Using Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (+97.73%)
Mutual labels:  phishing
Public-Intelligence-Feeds
Standard-Format Threat Intelligence Feeds
Stars: ✭ 60 (+36.36%)
Mutual labels:  threat-intelligence
Etherscamdb
Keep track of all current ethereum scams in a large database
Stars: ✭ 121 (+175%)
Mutual labels:  phishing
King Phisher Templates
Templates for the King Phisher open source phishing campaign toolkit.
Stars: ✭ 119 (+170.45%)
Mutual labels:  phishing
mail to misp
Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Stars: ✭ 61 (+38.64%)
Mutual labels:  threat-intelligence
Phish Collect
Python script to hunt phishing kits
Stars: ✭ 113 (+156.82%)
Mutual labels:  phishing
threat-intel
Signatures and IoCs from public Volexity blog posts.
Stars: ✭ 130 (+195.45%)
Mutual labels:  threat-intelligence
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (+6.82%)
Mutual labels:  phishing
Wifiphisher
Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+23384.09%)
Mutual labels:  phishing
Azure-Sentinel-4-SecOps
Microsoft Sentinel SOC Operations
Stars: ✭ 140 (+218.18%)
Mutual labels:  threat-intelligence
1-60 of 212 similar projects