Find phishing kits which use your brand/organization's files and image.
☆239Jan 21, 2019Updated 7 years ago
Alternatives and similar repositories for PhishingKitHunter
Users that are interested in PhishingKitHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆662Mar 11, 2024Updated 2 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- A phishing kit collector for scavengers☆221Jan 22, 2026Updated 2 months ago
- Credential Phish Analysis and Automation☆99Aug 22, 2018Updated 7 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- Phishing catcher using Certstream☆1,794Aug 13, 2024Updated last year
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆238Mar 8, 2026Updated 2 weeks ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Phishing toolkit for red teams and pentesters.☆125Jun 1, 2018Updated 7 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆629Oct 16, 2018Updated 7 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆556May 9, 2023Updated 2 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- A toolkit for Security Researchers☆125Sep 2, 2019Updated 6 years ago
- The Traditional Swiss Army Knife for OSINT☆558Jun 10, 2021Updated 4 years ago
- Your Everyday Threat Intelligence☆1,962Updated this week
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing dom…☆1,525Mar 13, 2026Updated last week
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆106May 30, 2017Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,616Apr 15, 2025Updated 11 months ago
- Tool to automatic leak information using Hacking with engine searches☆93May 9, 2018Updated 7 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- A Phishing Dropper designed to Pentest.☆276May 15, 2017Updated 8 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆295Aug 1, 2023Updated 2 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Jan 7, 2023Updated 3 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago