ninoseki / miteruLinks
A phishing kit collector for scavengers
☆214Updated 2 weeks ago
Alternatives and similar repositories for miteru
Users that are interested in miteru are comparing it to the libraries listed below
Sorting:
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 3 years ago
- A tool designed to hunt for Phishing Kit source code☆222Updated 2 years ago
- Awesome VirusTotal Intelligence Search Queries☆333Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆240Updated 3 years ago
- Don't Just Search OSINT. Sweep It.☆315Updated 4 years ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆91Updated 2 years ago
- Find phishing kits which use your brand/organization's files and image.☆237Updated 6 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆223Updated last week
- Yara scan Phishing Kit's Zip archive(s)☆59Updated last year
- Threat-Intelligence Feeds & Tools & Frameworks☆218Updated last year
- Python script to hunt phishing kits☆138Updated last year
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- Valhalla API Client☆70Updated 2 years ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆202Updated last year
- Ransomware leak site monitoring☆312Updated 3 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆177Updated last year
- ☆173Updated 11 months ago
- Website crawler with YARA detection☆88Updated last year
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆87Updated this week
- ☆126Updated 4 years ago
- Gather Open-Source Intelligence using PowerShell.☆175Updated 5 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 4 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- Swordphish Phishing Awareness Tool☆224Updated 9 months ago
- A modular OSINT honeypot for blue teamers☆335Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆211Updated 3 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆202Updated 4 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago