SpoofThatMail
Phishing.Database
SpoofThatMail | Phishing.Database | |
---|---|---|
2 | 5 | |
309 | 1,034 | |
- | - | |
1.8 | 3.6 | |
about 2 years ago | 5 days ago | |
Shell | Shell | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
SpoofThatMail
Phishing.Database
-
Pi-Hole blockin gMail and Google account page.
I think this was due to a series of false positives in one of the lists at Phishing Database (phishing-domains-ACTIVE.txt in particular)
-
セキュリティ・キャンプ全国大会 2022 Y4チューター 参加記
I collected the phishing domains from the Phishing.Database, and the legitimate sites from the Whitelist in Ultimate-Hosts-Blacklist.
-
Our site has been reported maliciously for Phishing on phishtank.org, but unable to register to report a false positive
[FALSE-POSITIVE] · Issue #194 · mitchellkrogza/Phishing.Database · GitHub
-
NoScript Site Compromised?
The Phishing URL Blocklist is just a collection of other blocklists. One of them is this one: https://github.com/mitchellkrogza/Phishing.Database The raw list is here: https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-domains-ACTIVE.txt (archive.org link) This contains the noscript.net domain.
-
Source of Active Phishing Links and Malicious Attachments
For some quick starting points, I‘d: - setup a MISP server and feast on the great free feeds from e.g. abuse.ch - Alienvault OTX (and how to pull into MISP: https://otx-misp.readthedocs.io/en/latest/) - https://github.com/mitchellkrogza/Phishing.Database - Malware samples: nice curated collection from Lenny Zeltser: https://zeltser.com/malware-sample-sources/ - focus on "theZoo" - https://bazaar.abuse.ch/browse/ - see the OSINT section: https://learnpracticeandshare.com/awesome-malware-analysis-massive-collection-of-resources/ - https://cofense.com/product-services/phishing-intelligence/ (90 day trial) - Reach out to Project Honeypot
What are some alternatives?
Cloudflare-DDNS-Update - Advanced Dynamic DNS Update Script for Cloudflare
Malware_Society - This is created for updating Various Viruses, malware, and all! Also new kind for vulnerability and attacks!
phishing-writeup - Bespoke Phishing Against vSphere & Slack (Attacking QUT Students - Class Activity)
TweetFeed - TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
maskphish - Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
GrimeyPhisher - Phishing Toolkit
sublime-platform - A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
scam-links - Collection of phishing and malicious links that focuses on Steam and Discord scams.
whitelist - The whitelist of the Ultimate Hosts Blacklist project, infrastructure and beyond.
noscript - The popular NoScript Security Suite browser extension.
antispam-it - lists to spam a lot of rubbish ... hand-curated to fight spammers and phishing harassing poor italian (domain.it) mailboxes #spamrevenge
steamscamsite - Steam, Dota, CSGO, PUBG Scam Site