Exposing phishing kits seen from phishunt.io
☆267Jun 13, 2025Updated 10 months ago
Alternatives and similar repositories for phishing_kits
Users that are interested in phishing_kits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository of Yara rules dedicated to Phishing Kits Zip files☆239Apr 8, 2026Updated 3 weeks ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆192Apr 24, 2025Updated last year
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆665Mar 11, 2024Updated 2 years ago
- A phishing kit collector for scavengers☆222Jan 22, 2026Updated 3 months ago
- A tool designed to hunt for Phishing Kit source code☆231Jan 29, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Exposing phishing kits, creators and malicious actors.☆52Dec 6, 2022Updated 3 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆655Updated this week
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 10 months ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Jan 7, 2023Updated 3 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing dom…☆1,547Updated this week
- Automatically created C2 Feeds☆679Updated this week
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- Phishing Reverse Proxy with MFA bypass☆18Jan 28, 2023Updated 3 years ago
- Phishing catcher using Certstream☆1,800Aug 13, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Jan 22, 2023Updated 3 years ago
- Source code used at TweetFeed.live☆49Nov 21, 2022Updated 3 years ago
- StalkPhish-OSS - The Phishing kits stalker, harvesting phishing kits for investigations.☆87Jun 28, 2025Updated 10 months ago
- Defanged Indicator of Compromise (IOC) Extractor.☆576Aug 28, 2024Updated last year
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆89Oct 27, 2022Updated 3 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,824Apr 28, 2026Updated last week
- AIL framework - Analysis Information Leak framework☆939Apr 29, 2026Updated last week
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆190May 5, 2025Updated last year
- ☆36Jan 11, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆508Oct 7, 2024Updated last year
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated last year
- Live Feed of C2 servers, tools, and botnets☆772Apr 13, 2026Updated 3 weeks ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆954Apr 27, 2026Updated last week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆794Feb 8, 2026Updated 2 months ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago