Catching malicious phishing domain names using certstream SSL certificates live stream.
The script should work fine using Python2 or Python3.
You will need the following python packages installed: certstream, tqdm, entropy, termcolor, tld, python_Levenshtein
pip install -r requirements.txt
$ ./catch_phishing.py
This fork of the original script has been modified in the following ways:
- Tags are now included in each "report" of a domain
- The raw certstream message data, the determined score, the tags, and a timestamp are now written to disk under the
./data
directory with the formatpc_{uuid}.{%Y-%m-%d-%H}.{score_range}.log
as newline-delimited JSON documents (where the UUID is unique for each run of the script). Score range is one of [100, 90, 80, 65, 0] - Merged in various changes and improvements from other community forks
GNU GPLv3