Sha256: 8bbb2107255c7a6985a030f892da36d97b14373b371c469cab1ddbb5b3479f66
Contents?: true
Size: 1.66 KB
Versions: 12
Compression:
Stored size: 1.66 KB
Contents
# Miteru [![Gem Version](https://badge.fury.io/rb/miteru.svg)](https://badge.fury.io/rb/miteru) [![Ruby CI](https://github.com/ninoseki/miteru/actions/workflows/ruby.yml/badge.svg)](https://github.com/ninoseki/miteru/actions/workflows/ruby.yml) [![CodeFactor](https://www.codefactor.io/repository/github/ninoseki/miteru/badge)](https://www.codefactor.io/repository/github/ninoseki/miteru) [![Coverage Status](https://coveralls.io/repos/github/ninoseki/miteru/badge.svg?branch=master)](https://coveralls.io/github/ninoseki/miteru?branch=master) A phishing kit collector for scavengers. ## Disclaimer This tool is for research purposes only. The use of this tool is your responsibility. I take no responsibility and/or liability for how you choose to use this tool. ## How It Works - Collect phishy URLs from the following feeds: - urlscan.io's automatic submissions. (`task.method:automatic AND NOT task.source:urlscan-observe`) - urlscan.io phish feed. (available for Pro users) - [mitchellkrogza/Phishing.Database](https://github.com/mitchellkrogza/Phishing.Database)'s `phishing-links-ACTIVE-NOW.txt`. - [ninoseki/ayashige](https://github.com/ninoseki/ayashige) feed. - Check each phishy URL whether it enables directory listing and contains phishing kits (compressed files) or not. - Note: Supported compressed files are: `*.zip`, `*.rar`, `*.7z`, `*.tar` and `*.gz`. ## Docs - [Requirements & Installation](https://github.com/ninoseki/miteru/wiki/Requirements-&-Installation) - [Usage](https://github.com/ninoseki/miteru/wiki/Usage) - [Configuration](https://github.com/ninoseki/miteru/wiki/Configuration) - [Alternatives](https://github.com/ninoseki/miteru/wiki/Alternatives)
Version data entries
12 entries across 12 versions & 1 rubygems