wesleyraptor / streamingphishView external linksLinks
Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.
☆326Sep 11, 2024Updated last year
Alternatives and similar repositories for streamingphish
Users that are interested in streamingphish are comparing it to the libraries listed below
Sorting:
- Phishing catcher using Certstream☆1,790Aug 13, 2024Updated last year
- Monitor Certificate Transparency Logs For Phishing Domains☆24Nov 19, 2018Updated 7 years ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆148Feb 12, 2025Updated last year
- Python library for connecting to CertStream☆470Jul 25, 2024Updated last year
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- A phishing kit collector for scavengers☆220Jan 22, 2026Updated 3 weeks ago
- An analytical framework for network traffic and behavioral analytics☆457Dec 7, 2022Updated 3 years ago
- Fast Advanced Spam Analysis Tool☆305Aug 6, 2025Updated 6 months ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Jun 29, 2024Updated last year
- Your Everyday Threat Intelligence☆1,949Updated this week
- A toolkit for Security Researchers☆127Sep 2, 2019Updated 6 years ago
- PhishDetect is a library to help identify phishing pages☆109May 11, 2023Updated 2 years ago
- Find phishing kits which use your brand/organization's files and image.☆240Jan 21, 2019Updated 7 years ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,583Apr 15, 2025Updated 9 months ago
- Detect Phishing fetching Certificate Transparency Logs☆21Jan 13, 2021Updated 5 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated last month
- ☆24Sep 28, 2022Updated 3 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service written in Elixir☆328Feb 3, 2026Updated last week
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆252Jul 19, 2021Updated 4 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,710Sep 23, 2025Updated 4 months ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆504Oct 21, 2022Updated 3 years ago
- 16,432 Free Yara rules created by☆390Jun 1, 2019Updated 6 years ago
- Real-time, container-based file scanning at enterprise scale☆974Updated this week
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,339Dec 13, 2022Updated 3 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Python script to hunt phishing kits☆137Jul 25, 2023Updated 2 years ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- SMTP server / sinkhole for collecting spam☆46Jul 30, 2018Updated 7 years ago
- Automatically create YARA rules from malicious documents.☆212May 16, 2022Updated 3 years ago
- RELK -- The Research Elastic Stack (Kafka, Beats, Zookeeper, Logstash, ElasticSearch, Kibana, Spark, & Jupyter -- All in Docker)☆26Nov 7, 2019Updated 6 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆67Mar 6, 2018Updated 7 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆935Jan 8, 2026Updated last month
- Backup of my phishing regular expression testing bench☆151Mar 20, 2017Updated 8 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆289Jan 15, 2024Updated 2 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 8 months ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Jan 22, 2025Updated last year
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Apr 13, 2020Updated 5 years ago