Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.
☆327Sep 11, 2024Updated last year
Alternatives and similar repositories for streamingphish
Users that are interested in streamingphish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Monitor Certificate Transparency Logs For Phishing Domains☆23Nov 19, 2018Updated 7 years ago
- Phishing catcher using Certstream☆1,798Aug 13, 2024Updated last year
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆147Feb 12, 2025Updated last year
- An analytical framework for network traffic and behavioral analytics☆457Dec 7, 2022Updated 3 years ago
- Python library for connecting to CertStream☆471Jul 25, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆39Jun 29, 2024Updated last year
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- A toolkit for Security Researchers☆125Sep 2, 2019Updated 6 years ago
- Fast Advanced Spam Analysis Tool☆308Aug 6, 2025Updated 8 months ago
- A phishing kit collector for scavengers☆222Jan 22, 2026Updated 2 months ago
- Certificate Transparency Log aggregation, parsing, and streaming service written in Elixir☆341Feb 17, 2026Updated last month
- Find phishing kits which use your brand/organization's files and image.☆240Jan 21, 2019Updated 7 years ago
- RELK -- The Research Elastic Stack (Kafka, Beats, Zookeeper, Logstash, ElasticSearch, Kibana, Spark, & Jupyter -- All in Docker)☆27Nov 7, 2019Updated 6 years ago
- PhishDetect is a library to help identify phishing pages☆108May 11, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Your Everyday Threat Intelligence☆1,967Apr 6, 2026Updated last week
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,651Apr 15, 2025Updated last year
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,729Sep 23, 2025Updated 6 months ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆506Oct 21, 2022Updated 3 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆251Jul 19, 2021Updated 4 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 16,432 Free Yara rules created by☆389Jun 1, 2019Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,034May 27, 2020Updated 5 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- Real-time, container-based file scanning at enterprise scale☆983Mar 19, 2026Updated 3 weeks ago
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Detect Phishing fetching Certificate Transparency Logs☆21Jan 13, 2021Updated 5 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,344Dec 13, 2022Updated 3 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,939Jul 6, 2024Updated last year
- Map/Reduce functions for processing Certificate Transparency. Used for https://LetsEncrypt.org/stats☆11Feb 14, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 10 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,534Jan 12, 2026Updated 3 months ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆765Updated this week
- Splunk code (SPL) for serious threat hunters and detection engineers.☆292Jan 15, 2024Updated 2 years ago
- Backup of my phishing regular expression testing bench☆152Mar 20, 2017Updated 9 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆945Updated this week
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆662Mar 11, 2024Updated 2 years ago