Find phishing kits which use your brand/organization's files and image.
☆239Jan 21, 2019Updated 7 years ago
Alternatives and similar repositories for PhishingKitHunter
Users that are interested in PhishingKitHunter are comparing it to the libraries listed below
Sorting:
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆657Mar 11, 2024Updated last year
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- Credential Phish Analysis and Automation☆98Aug 22, 2018Updated 7 years ago
- Phishing catcher using Certstream☆1,791Aug 13, 2024Updated last year
- A phishing kit collector for scavengers☆220Jan 22, 2026Updated last month
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 8 months ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Phishing toolkit for red teams and pentesters.☆126Jun 1, 2018Updated 7 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆106May 30, 2017Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆238Feb 9, 2026Updated 3 weeks ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆556May 9, 2023Updated 2 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆629Oct 16, 2018Updated 7 years ago
- The Traditional Swiss Army Knife for OSINT☆557Jun 10, 2021Updated 4 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- Tool to automatic leak information using Hacking with engine searches☆93May 9, 2018Updated 7 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Your Everyday Threat Intelligence☆1,954Feb 12, 2026Updated 2 weeks ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- A Phishing Dropper designed to Pentest.☆276May 15, 2017Updated 8 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆152Oct 20, 2018Updated 7 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆294Aug 1, 2023Updated 2 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆796May 18, 2020Updated 5 years ago
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago