A tool designed to hunt for Phishing Kit source code
☆230Jan 29, 2026Updated 2 months ago
Alternatives and similar repositories for kitphishr
Users that are interested in kitphishr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆662Mar 11, 2024Updated 2 years ago
- A phishing kit collector for scavengers☆222Jan 22, 2026Updated 2 months ago
- Exposing phishing kits seen from phishunt.io☆267Jun 13, 2025Updated 10 months ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆46Nov 10, 2025Updated 5 months ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- The simplest way to find how to report abusive domains☆53May 8, 2023Updated 2 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- A CLI tool for querying passive DNS services☆43Dec 15, 2023Updated 2 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Jan 7, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆190Apr 24, 2025Updated 11 months ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated 2 years ago
- Ransomware leak site monitoring☆313Mar 7, 2022Updated 4 years ago
- Exposing phishing kits, creators and malicious actors.☆52Dec 6, 2022Updated 3 years ago
- Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing dom…☆1,536Apr 8, 2026Updated last week
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Find phishing kits which use your brand/organization's files and image.☆240Jan 21, 2019Updated 7 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆18Jun 14, 2023Updated 2 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,732Mar 21, 2026Updated 3 weeks ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆239Apr 8, 2026Updated last week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- A query aggregator for OSINT based threat hunting☆936Mar 7, 2026Updated last month
- Detect Tactics, Techniques & Combat Threats☆2,277Jan 21, 2026Updated 2 months ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Awesome VirusTotal Intelligence Search Queries☆333May 16, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- The undocumented API for reporting sites to Safe Browsing☆11Jun 3, 2020Updated 5 years ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆172Mar 12, 2025Updated last year
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,056Feb 18, 2026Updated last month
- Phishing catcher using Certstream☆1,798Aug 13, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,172Sep 29, 2021Updated 4 years ago