PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in #phishingkit , maintained by @neonprimetime
☆102Jan 11, 2022Updated 4 years ago
Alternatives and similar repositories for PhishingKitTracker
Users that are interested in PhishingKitTracker are comparing it to the libraries listed below
Sorting:
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- Find phishing kits which use your brand/organization's files and image.☆239Jan 21, 2019Updated 7 years ago
- Don't Just Search OSINT. Sweep It.☆312Jan 26, 2021Updated 5 years ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆657Mar 11, 2024Updated last year
- A phishing kit collector for scavengers☆220Jan 22, 2026Updated last month
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 8 months ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆238Feb 9, 2026Updated 3 weeks ago
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Jan 7, 2023Updated 3 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Gather Open-Source Intelligence using PowerShell.☆178Oct 20, 2019Updated 6 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- A tool designed to hunt for Phishing Kit source code☆229Jan 29, 2026Updated last month
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- Exposing phishing kits, creators and malicious actors.☆52Dec 6, 2022Updated 3 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- A bunch of scripts I use to work with urlscan.io☆35Oct 25, 2019Updated 6 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- A toolkit for Security Researchers☆126Sep 2, 2019Updated 6 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Sep 27, 2022Updated 3 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 12 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- Phishing catcher using Certstream☆1,791Aug 13, 2024Updated last year
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30May 12, 2013Updated 12 years ago
- Credential Phish Analysis and Automation☆98Aug 22, 2018Updated 7 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Dec 12, 2024Updated last year
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Jun 29, 2023Updated 2 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Java library for connecting to the CertStream network.☆20May 20, 2022Updated 3 years ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 3 months ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Jan 14, 2022Updated 4 years ago