Repository of Yara rules dedicated to Phishing Kits Zip files
☆239Apr 8, 2026Updated 3 weeks ago
Alternatives and similar repositories for PhishingKit-Yara-Rules
Users that are interested in PhishingKit-Yara-Rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 10 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆192Apr 24, 2025Updated last year
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆665Mar 11, 2024Updated 2 years ago
- Exposing phishing kits seen from phishunt.io☆267Jun 13, 2025Updated 10 months ago
- Sn0ffer - Make sound/noise/music with your network connection!☆20Jul 1, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A phishing kit collector for scavengers☆222Jan 22, 2026Updated 3 months ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- ReversingLabs YARA Rules☆913Nov 3, 2025Updated 6 months ago
- Find phishing kits which use your brand/organization's files and image.☆240Jan 21, 2019Updated 7 years ago
- Collection of private Yara rules.☆380Jan 28, 2026Updated 3 months ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- ☆130Feb 2, 2025Updated last year
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Jan 7, 2023Updated 3 years ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆655Updated this week
- Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing dom…☆1,547Updated this week
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆954Apr 27, 2026Updated last week
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Signatures and IoCs from public Volexity blog posts.☆367Dec 4, 2025Updated 5 months ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆39Jun 29, 2024Updated last year
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 7 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆63Apr 11, 2026Updated 3 weeks ago
- Automatically created C2 Feeds☆679Updated this week
- ☆21Mar 20, 2026Updated last month
- Extract and aggregate threat intelligence.☆913Jan 31, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Yara Rules for Modern Malware☆80Mar 3, 2024Updated 2 years ago
- Web Application for domain name monitoring / alerting☆66Aug 1, 2024Updated last year
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆391May 11, 2022Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- YARA signature and IOC database for my scanners and tools☆2,949Updated this week
- A CLI tool for querying passive DNS services☆43Dec 15, 2023Updated 2 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 3 years ago