andpalmier / phishfloodLinks
Pollute phishing kits with fake credentials
☆11Updated 4 years ago
Alternatives and similar repositories for phishflood
Users that are interested in phishflood are comparing it to the libraries listed below
Sorting:
- Yara scan Phishing Kit's Zip archive(s)☆61Updated 6 months ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Updated 3 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- ☆53Updated 4 years ago
- Fraud prevention tool☆28Updated 5 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Updated 4 years ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆118Updated 6 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Updated 3 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆68Updated 4 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆35Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- ☆33Updated 11 months ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆29Updated 4 years ago
- OSINT tool for discovering confidential data leaked on Github.☆50Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆14Updated 3 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- Python3 interface for the EmailRep API☆55Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28Updated last year
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago