SteveD3 / kit_hunter
A basic phishing kit scanner for dedicated and semi-dedicated hosting
☆108Updated 2 years ago
Alternatives and similar repositories for kit_hunter:
Users that are interested in kit_hunter are comparing it to the libraries listed below
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆100Updated 3 years ago
- Website crawler with YARA detection☆88Updated last year
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆90Updated 2 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- A phishing kit collector for scavengers☆196Updated 2 months ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆86Updated last week
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 2 months ago
- For storing of the volumes☆4Updated 5 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆147Updated last year
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆85Updated 3 months ago
- Python library for threat intelligence☆84Updated 2 months ago
- Yara scan Phishing Kit's Zip archive(s)☆57Updated 11 months ago
- A collection of tips for using MISP.☆74Updated 3 months ago
- Linux Incident Response☆90Updated 5 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆48Updated 2 years ago
- The FASTEST way to consume threat intel.☆68Updated last year
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆71Updated last year
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆105Updated last year
- Valhalla API Client☆68Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆215Updated 9 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 2 months ago
- ☆52Updated this week