phishing_catcher
phishing_catcher copied to clipboard
Phishing catcher using Certstream
While playing around with the script and the stream i often saw something like this: ``` [!] Likely : catfinder-beta.corp.amazon.com (score=84) [!] Likely : catfinder-test.corp.amazon.com (score=84) [!] Likely : catfinder.corp.amazon.com...
I Propose to score domains higher if they got more than two short parts towards the end so that ``` some-domain.co.uk ``` is ok but something like ``` some-domain.com.info.co.uk.com ```...
Seems to be an error with certstream and the encoding and decoding within the confusables.py file.
Awesome script u wrote, although I might have a small improvement idea on it. Maybe it's possible to whitelist all known google domains. There are various public list that state...
Hello, Your repo can help a lot of people, but you should check for domains that have special characters like the ỵ , ṙ . Let me know about updates!
Hello I was wondering... Maybe a option to search into certstream log for search specific tags and parameters, will be useful in Osint investigations.
Create support to read custom include configs for suspicious_keywords, highly_suspicious and suspicious_tld arrays so that every commit avoids stomping on local changes.
Everything is in the title. What do you think about adding some travis CI as much as checks for PEP-8 compliancy, sorted imports and so on?
Hey! Could someone help me with that the phishing_catcher is disconnecting and reconnecting in every minutes? certificate_update: 386526cert [42:33, 119.09cert/s][ERROR:root] 2024-01-28 09:55:53,383 - Error connecting to CertStream - Connection is...
I cleaned up the code. A lot. I created the ignore_domains functionality that allows you to ignore certain domains. I also incorporated the stuff in pr #49. Also in this...