Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Dnstwist | 4,285 | 2 | 2 months ago | 21 | September 18, 2023 | 12 | apache-2.0 | Python | ||
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation | ||||||||||
Phishing_catcher | 1,623 | 2 months ago | 32 | gpl-3.0 | Python | |||||
Phishing catcher using Certstream | ||||||||||
Watcher | 791 | 4 months ago | 16 | agpl-3.0 | Python | |||||
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS. | ||||||||||
Stalkphish | 581 | 2 months ago | 6 | agpl-3.0 | Python | |||||
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations. | ||||||||||
Opensquat | 576 | 6 months ago | 1 | June 17, 2023 | 16 | gpl-3.0 | Python | |||
The openSquat project is an open-source solution for detecting phishing domains and domain squatting. It searches for newly registered domains that impersonate legitimate domains on a daily basis. | ||||||||||
Urlextractor | 427 | 5 years ago | 1 | mit | Shell | |||||
Information gathering & website reconnaissance | https://phishstats.info/ | ||||||||||
Tweetfeed | 389 | 2 months ago | ||||||||
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes. | ||||||||||
Osweep | 237 | 3 years ago | 3 | mit | Python | |||||
Don't Just Search OSINT. Sweep It. | ||||||||||
Analyzer | 222 | 8 months ago | 1 | agpl-3.0 | Python | |||||
Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more) | ||||||||||
I See You | 188 | 5 years ago | 3 | Shell | ||||||
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks. |