Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.
☆327Sep 11, 2024Updated last year
Alternatives and similar repositories for streamingphish
Users that are interested in streamingphish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Monitor Certificate Transparency Logs For Phishing Domains☆23Nov 19, 2018Updated 7 years ago
- Phishing catcher using Certstream☆1,800Aug 13, 2024Updated last year
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆147Feb 12, 2025Updated last year
- An analytical framework for network traffic and behavioral analytics☆457Dec 7, 2022Updated 3 years ago
- Python library for connecting to CertStream☆471Jul 25, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆39Jun 29, 2024Updated last year
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- A toolkit for Security Researchers☆125Sep 2, 2019Updated 6 years ago
- Fast Advanced Spam Analysis Tool☆309Aug 6, 2025Updated 8 months ago
- A phishing kit collector for scavengers☆222Jan 22, 2026Updated 3 months ago
- Certificate Transparency Log aggregation, parsing, and streaming service written in Elixir☆344Feb 17, 2026Updated 2 months ago
- Find phishing kits which use your brand/organization's files and image.☆240Jan 21, 2019Updated 7 years ago
- RELK -- The Research Elastic Stack (Kafka, Beats, Zookeeper, Logstash, ElasticSearch, Kibana, Spark, & Jupyter -- All in Docker)☆28Nov 7, 2019Updated 6 years ago
- PhishDetect is a library to help identify phishing pages☆108May 11, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Your Everyday Threat Intelligence☆1,977Apr 14, 2026Updated 3 weeks ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,668Apr 15, 2025Updated last year
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆506Oct 21, 2022Updated 3 years ago
- ☆12Apr 26, 2018Updated 8 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆251Jul 19, 2021Updated 4 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 16,432 Free Yara rules created by☆388Jun 1, 2019Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- Real-time, container-based file scanning at enterprise scale☆985Mar 19, 2026Updated last month
- Detect Phishing fetching Certificate Transparency Logs☆21Jan 13, 2021Updated 5 years ago
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,345Dec 13, 2022Updated 3 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,954Jul 6, 2024Updated last year
- Map/Reduce functions for processing Certificate Transparency. Used for https://LetsEncrypt.org/stats☆11Feb 14, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 11 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,544Jan 12, 2026Updated 3 months ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆768Updated this week
- Splunk code (SPL) for serious threat hunters and detection engineers.☆293Jan 15, 2024Updated 2 years ago
- Backup of my phishing regular expression testing bench☆152Mar 20, 2017Updated 9 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆954Apr 27, 2026Updated last week
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆665Mar 11, 2024Updated 2 years ago