t4d / PhishingKit-Yara-RulesView external linksLinks
Repository of Yara rules dedicated to Phishing Kits Zip files
☆234Updated this week
Alternatives and similar repositories for PhishingKit-Yara-Rules
Users that are interested in PhishingKit-Yara-Rules are comparing it to the libraries listed below
Sorting:
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 7 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆190Apr 24, 2025Updated 9 months ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆659Mar 11, 2024Updated last year
- Exposing phishing kits seen from phishunt.io☆264Jun 13, 2025Updated 8 months ago
- A phishing kit collector for scavengers☆220Jan 22, 2026Updated 3 weeks ago
- ReversingLabs YARA Rules☆895Nov 3, 2025Updated 3 months ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- Find phishing kits which use your brand/organization's files and image.☆240Jan 21, 2019Updated 7 years ago
- Collection of private Yara rules.☆378Jan 28, 2026Updated 2 weeks ago
- Python script to hunt phishing kits☆137Jul 25, 2023Updated 2 years ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆635Updated this week
- Signatures and IoCs from public Volexity blog posts.☆362Dec 4, 2025Updated 2 months ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Extract and aggregate threat intelligence.☆902Jan 31, 2024Updated 2 years ago
- ☆128Feb 2, 2025Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 4 months ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing dom…☆1,499Updated this week
- Repository of YARA rules made by Trellix ATR Team☆623Mar 18, 2025Updated 10 months ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Jan 7, 2023Updated 3 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆935Jan 8, 2026Updated last month
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last week
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Jun 29, 2024Updated last year
- Automatically create YARA rules from malicious documents.☆212May 16, 2022Updated 3 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated last year
- Web Application for domain name monitoring / alerting☆64Aug 1, 2024Updated last year
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388May 11, 2022Updated 3 years ago
- ☆21Nov 7, 2025Updated 3 months ago
- YARA signature and IOC database for my scanners and tools☆2,864Feb 5, 2026Updated last week
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Your Everyday Threat Intelligence☆1,949Updated this week
- ☆22Dec 22, 2020Updated 5 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Automatically created C2 Feeds☆661Updated this week