A tool designed to hunt for Phishing Kit source code
☆230Jan 29, 2026Updated last month
Alternatives and similar repositories for kitphishr
Users that are interested in kitphishr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆662Mar 11, 2024Updated 2 years ago
- A phishing kit collector for scavengers☆221Jan 22, 2026Updated 2 months ago
- Exposing phishing kits seen from phishunt.io☆266Jun 13, 2025Updated 9 months ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆45Nov 10, 2025Updated 4 months ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- The simplest way to find how to report abusive domains☆53May 8, 2023Updated 2 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Jan 7, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆190Apr 24, 2025Updated 11 months ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- Ransomware leak site monitoring☆312Mar 7, 2022Updated 4 years ago
- Exposing phishing kits, creators and malicious actors.☆52Dec 6, 2022Updated 3 years ago
- Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing dom…☆1,528Mar 13, 2026Updated last week
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Find phishing kits which use your brand/organization's files and image.☆239Jan 21, 2019Updated 7 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,653Mar 11, 2026Updated 2 weeks ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆238Mar 8, 2026Updated 2 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- Get VirusTotal report for a given hash using PowerShell☆11Sep 20, 2022Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- A query aggregator for OSINT based threat hunting☆932Mar 7, 2026Updated 2 weeks ago
- Detect Tactics, Techniques & Combat Threats☆2,269Jan 21, 2026Updated 2 months ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Awesome VirusTotal Intelligence Search Queries☆333May 16, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- The undocumented API for reporting sites to Safe Browsing☆11Jun 3, 2020Updated 5 years ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆172Mar 12, 2025Updated last year
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,048Feb 18, 2026Updated last month
- Phishing catcher using Certstream☆1,794Aug 13, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,168Sep 29, 2021Updated 4 years ago