SteveD3 / kit_hunter
A basic phishing kit scanner for dedicated and semi-dedicated hosting
☆108Updated 2 years ago
Alternatives and similar repositories for kit_hunter:
Users that are interested in kit_hunter are comparing it to the libraries listed below
- Website crawler with YARA detection☆88Updated last year
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆100Updated 3 years ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆89Updated 2 years ago
- A tool designed to hunt for Phishing Kit source code☆222Updated 2 years ago
- A phishing kit collector for scavengers☆201Updated this week
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆86Updated this week
- Valhalla API Client☆68Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆238Updated 3 years ago
- Python wrapper for urlscan.io's API☆102Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆148Updated 3 years ago
- Yara scan Phishing Kit's Zip archive(s)☆58Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Automagically extract forensic timeline from volatile memory dump☆130Updated 11 months ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆87Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- Threat-Intelligence Feeds & Tools & Frameworks☆215Updated 10 months ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- For storing of the volumes☆4Updated 5 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆72Updated 5 months ago