catching-transparent-phish / phocaView external linksLinks
Tool to analyze and detect MITM phishing toolkits on the web.
☆83Dec 1, 2021Updated 4 years ago
Alternatives and similar repositories for phoca
Users that are interested in phoca are comparing it to the libraries listed below
Sorting:
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 6 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆190Apr 24, 2025Updated 9 months ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- A script used to query the dehashed API and filter for more useful results☆17Jun 20, 2021Updated 4 years ago
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆12Mar 30, 2021Updated 4 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Aug 1, 2022Updated 3 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- Saves pages to Wayback machine☆13Dec 2, 2024Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- ☆20Apr 10, 2025Updated 10 months ago
- ☆18Dec 6, 2022Updated 3 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ☆28Mar 29, 2022Updated 3 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Vault of Windows Registry forensic artifacts☆26Nov 12, 2025Updated 3 months ago
- ☆36Jan 11, 2023Updated 3 years ago
- Forensic Reconstruction of Severely Degraded License Plates, Electronic Imaging, 2019.☆17Apr 27, 2022Updated 3 years ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- Repository to host scripts discussed in https://www.notsosecure.com/crafting-way-json-web-tokens/☆15Aug 4, 2018Updated 7 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- DNS resolution tracing tool☆35Jun 29, 2021Updated 4 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- ☆21Aug 26, 2021Updated 4 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated last month
- ☆20Feb 9, 2024Updated 2 years ago
- Exposing phishing kits seen from phishunt.io☆264Jun 13, 2025Updated 8 months ago
- Uncover the full name of a target on Linkedin.☆163May 27, 2022Updated 3 years ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆45Nov 10, 2025Updated 3 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50May 3, 2022Updated 3 years ago
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago