Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.
☆327Sep 11, 2024Updated last year
Alternatives and similar repositories for streamingphish
Users that are interested in streamingphish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Monitor Certificate Transparency Logs For Phishing Domains☆23Nov 19, 2018Updated 7 years ago
- Phishing catcher using Certstream☆1,794Aug 13, 2024Updated last year
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆147Feb 12, 2025Updated last year
- An analytical framework for network traffic and behavioral analytics☆455Dec 7, 2022Updated 3 years ago
- Python library for connecting to CertStream☆471Jul 25, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆39Jun 29, 2024Updated last year
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- A toolkit for Security Researchers☆125Sep 2, 2019Updated 6 years ago
- Fast Advanced Spam Analysis Tool☆307Aug 6, 2025Updated 7 months ago
- A phishing kit collector for scavengers☆221Jan 22, 2026Updated 2 months ago
- Certificate Transparency Log aggregation, parsing, and streaming service written in Elixir☆340Feb 17, 2026Updated last month
- Find phishing kits which use your brand/organization's files and image.☆239Jan 21, 2019Updated 7 years ago
- RELK -- The Research Elastic Stack (Kafka, Beats, Zookeeper, Logstash, ElasticSearch, Kibana, Spark, & Jupyter -- All in Docker)☆27Nov 7, 2019Updated 6 years ago
- PhishDetect is a library to help identify phishing pages☆108May 11, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Your Everyday Threat Intelligence☆1,962Updated this week
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,616Apr 15, 2025Updated 11 months ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,723Sep 23, 2025Updated 6 months ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆506Oct 21, 2022Updated 3 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆252Jul 19, 2021Updated 4 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- Real-time, container-based file scanning at enterprise scale☆979Mar 19, 2026Updated last week
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Detect Phishing fetching Certificate Transparency Logs☆21Jan 13, 2021Updated 5 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,341Dec 13, 2022Updated 3 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,921Jul 6, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,508Jan 12, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆760Mar 17, 2026Updated last week
- Splunk code (SPL) for serious threat hunters and detection engineers.☆291Jan 15, 2024Updated 2 years ago
- Backup of my phishing regular expression testing bench☆151Mar 20, 2017Updated 9 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆942Mar 13, 2026Updated last week
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆662Mar 11, 2024Updated 2 years ago
- ☆1,091May 1, 2019Updated 6 years ago