ninoseki / miteruLinks
A phishing kit collector for scavengers
☆219Updated last month
Alternatives and similar repositories for miteru
Users that are interested in miteru are comparing it to the libraries listed below
Sorting:
- Awesome VirusTotal Intelligence Search Queries☆332Updated 2 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 4 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Updated 3 years ago
- A tool designed to hunt for Phishing Kit source code☆229Updated 2 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Updated 3 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆222Updated last year
- Scripts to analyze stuff☆146Updated 5 months ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆234Updated 3 weeks ago
- Ransomware leak site monitoring☆315Updated 3 years ago
- Website crawler with YARA detection☆90Updated 2 years ago
- Don't Just Search OSINT. Sweep It.☆314Updated 4 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Updated 6 months ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆93Updated this week
- Valhalla API Client☆70Updated last week
- A toolkit for Security Researchers☆127Updated 6 years ago
- Python wrapper for urlscan.io's API☆105Updated 4 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Updated last year
- Python script to hunt phishing kits☆137Updated 2 years ago
- Find phishing kits which use your brand/organization's files and image.☆240Updated 6 years ago
- Automagically extract forensic timeline from volatile memory dump☆131Updated last year
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆182Updated last year
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆205Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 11 months ago
- Python3 library and command line for GreyNoise☆176Updated 5 months ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 3 years ago
- Automated handling of data feeds for security teams☆146Updated 2 weeks ago
- Domain name permutation as a service☆65Updated 10 months ago
- Automatically create YARA rules from malicious documents.☆212Updated 3 years ago