Skip to content

Phishing catcher using Certstream - Andrew Breksa edition

License

Notifications You must be signed in to change notification settings

abreksa4/phishing_catcher

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

50 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Phishing catcher

Catching malicious phishing domain names using certstream SSL certificates live stream.

usage

Installation

The script should work fine using Python2 or Python3.

You will need the following python packages installed: certstream, tqdm, entropy, termcolor, tld, python_Levenshtein

pip install -r requirements.txt

Usage

$ ./catch_phishing.py

Notes

This fork of the original script has been modified in the following ways:

  1. Tags are now included in each "report" of a domain
  2. The raw certstream message data, the determined score, the tags, and a timestamp are now written to disk under the ./data directory with the format pc_{uuid}.{%Y-%m-%d-%H}.{score_range}.log as newline-delimited JSON documents (where the UUID is unique for each run of the script). Score range is one of [100, 90, 80, 65, 0]
  3. Merged in various changes and improvements from other community forks

Example phishing caught

Paypal Phishing

License

GNU GPLv3

About

Phishing catcher using Certstream - Andrew Breksa edition

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%