x0rz / phishing_catcher
Phishing catcher using Certstream
☆1,742Updated 8 months ago
Alternatives and similar repositories for phishing_catcher:
Users that are interested in phishing_catcher are comparing it to the libraries listed below
- CLI tool for open source and threat intelligence☆1,205Updated 2 months ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,209Updated 6 years ago
- Scanning pastebin with yara rules☆1,089Updated 10 months ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,327Updated last week
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,360Updated 4 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,103Updated 4 years ago
- Subdomain enumeration and information gathering tool☆1,288Updated 3 weeks ago
- A default credential scanner.☆1,479Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,273Updated 3 months ago
- Your Everyday Threat Intelligence☆1,847Updated this week
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,353Updated last year
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,012Updated 4 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,255Updated 9 months ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆639Updated last year
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,035Updated last week
- A toolset to make a system look as if it was the victim of an APT attack☆2,588Updated last year
- Find open databases - Powered by Binaryedge.io☆1,342Updated 4 years ago
- Find exploits in local and online databases instantly☆1,731Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,103Updated 3 months ago
- Advanced Honeypot framework.☆1,252Updated last year
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆995Updated 7 years ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,393Updated 7 months ago
- Data exfiltration over DNS request covert channel☆867Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,766Updated last week
- online port scan scraper☆1,119Updated last year
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,600Updated 4 years ago
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,685Updated 2 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆631Updated 2 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,309Updated 3 years ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,141Updated 3 weeks ago