Tool to analyze and detect MITM phishing toolkits on the web.
☆83Dec 1, 2021Updated 4 years ago
Alternatives and similar repositories for phoca
Users that are interested in phoca are comparing it to the libraries listed below
Sorting:
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- ☆13Oct 21, 2022Updated 3 years ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆190Apr 24, 2025Updated 10 months ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- Golang based web service to scan files with yara rules☆25Jul 6, 2017Updated 8 years ago
- Repository to host scripts discussed in https://www.notsosecure.com/crafting-way-json-web-tokens/☆15Aug 4, 2018Updated 7 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- ☆20Apr 10, 2025Updated 11 months ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Scripts for TheHive.☆23Nov 15, 2019Updated 6 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- Exposing phishing kits seen from phishunt.io☆266Jun 13, 2025Updated 9 months ago
- Hatching Triage public command-line utility and API library.☆75Oct 9, 2023Updated 2 years ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- Vault of Windows Registry forensic artifacts☆28Nov 12, 2025Updated 4 months ago
- ☆15May 22, 2023Updated 2 years ago
- A Go implementation of JARM☆119Jun 14, 2022Updated 3 years ago
- A phishing kit collector for scavengers☆221Jan 22, 2026Updated 2 months ago
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆17Nov 11, 2024Updated last year
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- VirusTotal Intelligence Search☆40May 21, 2020Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆238Mar 8, 2026Updated last week
- ☆36Jan 11, 2023Updated 3 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Jan 22, 2023Updated 3 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16May 14, 2025Updated 10 months ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 9 months ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- Code listing for the paper 'SATAR: A Self-supervised Approach to Twitter Account Representation Learning and its Application in Bot Detec…☆10Nov 1, 2021Updated 4 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Jan 7, 2023Updated 3 years ago
- Download all of a given user's public Pastebin pastes☆33Apr 16, 2025Updated 11 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Sep 24, 2023Updated 2 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago