cybercdh / phishfinderView external linksLinks
A tool designed to traverse phishing URL paths to search for phishing kit source code.
☆92Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for phishfinder
Users that are interested in phishfinder are comparing it to the libraries listed below
Sorting:
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- A tool designed to hunt for Phishing Kit source code☆229Jan 29, 2026Updated 2 weeks ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆659Mar 11, 2024Updated last year
- Python script to hunt phishing kits☆137Jul 25, 2023Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 4 years ago
- Find phishing kits which use your brand/organization's files and image.☆240Jan 21, 2019Updated 7 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- A phishing kit collector for scavengers☆220Jan 22, 2026Updated 3 weeks ago
- WEFTools☆14Apr 30, 2020Updated 5 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- ☆23Mar 17, 2024Updated last year
- Tools to search through massive amounts of data☆21Oct 20, 2025Updated 3 months ago
- 16,432 Free Yara rules created by☆390Jun 1, 2019Updated 6 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆29Jan 5, 2026Updated last month
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Vthunting is a tiny script used to generate report about Virus Total hunting and send it by email, slack or telegram.☆168Feb 8, 2023Updated 3 years ago
- ☆97Oct 7, 2020Updated 5 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 7 months ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Gather Open-Source Intelligence using PowerShell.☆178Oct 20, 2019Updated 6 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 4 months ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- Scanning pastebin with yara rules☆1,126Jan 10, 2026Updated last month
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Sep 26, 2017Updated 8 years ago
- Parse YARA rules and operate over them more easily.☆195Feb 6, 2025Updated last year
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 7 years ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆107Mar 4, 2021Updated 4 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆236Jan 16, 2026Updated 3 weeks ago
- Website crawler with YARA detection☆90Aug 20, 2023Updated 2 years ago
- ☆39Feb 12, 2020Updated 6 years ago