swimlane / trawlView external linksLinks
A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity
☆36Jan 14, 2022Updated 4 years ago
Alternatives and similar repositories for trawl
Users that are interested in trawl are comparing it to the libraries listed below
Sorting:
- Locust.io Awesomeness is here☆13Oct 11, 2017Updated 8 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- A windows kernel-mode rootkit with remote control☆12Sep 17, 2022Updated 3 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Oct 18, 2019Updated 6 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- Automated phishing catcher☆12Nov 27, 2025Updated 2 months ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- Saturate the bad guys' databases.☆14Jan 19, 2024Updated 2 years ago
- A phishing kit collector for scavengers☆220Jan 22, 2026Updated 3 weeks ago
- Generation of STIX2 compliant entities for Maltego☆20Oct 4, 2023Updated 2 years ago
- Detection of malicious domains via character co-occurrence analysis in URL's.☆11Mar 22, 2016Updated 9 years ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Jun 22, 2021Updated 4 years ago
- Find phishing kits which use your brand/organization's files and image.☆240Jan 21, 2019Updated 7 years ago
- ☆19Jan 27, 2022Updated 4 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- Documentation used for Shuffle☆21Updated this week
- The backend server handling API requests and task management☆55Updated this week
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆659Mar 11, 2024Updated last year
- Making it easier to manage DMARC reports☆21Jul 16, 2021Updated 4 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- ☆25Dec 8, 2021Updated 4 years ago
- Full reversing of the Microsoft Auxiliary Windows API Library and ported to C☆24Dec 17, 2024Updated last year
- Python script to hunt phishing kits☆137Jul 25, 2023Updated 2 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- Windows Event Log Knowledge Base☆29Dec 23, 2025Updated last month
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- A simple example how to decrypt kernel debugger data block☆31Feb 8, 2021Updated 5 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- Awesome VirusTotal Intelligence Search Queries☆331May 16, 2023Updated 2 years ago
- A python package for use in generating fake data for SOC and security automation.☆175Mar 7, 2025Updated 11 months ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Jan 5, 2019Updated 7 years ago
- ☆71Jan 23, 2026Updated 3 weeks ago
- Polymorphic code obfuscator for use in Red Team operations☆32Apr 13, 2022Updated 3 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆293Aug 1, 2023Updated 2 years ago
- Repository for my ATT&CK analysis research.☆71May 16, 2019Updated 6 years ago
- A Python package to search & delete messages from mailboxes in Office 365 using Microsoft Graph API☆25Feb 15, 2022Updated 3 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Dec 5, 2023Updated 2 years ago