Miteru - An Experimental Phishing Kit Detection Tool

Miteru - An Experimental Phishing Kit Detection Tool - Hi friends mederc, In the article that you read this time with the title Miteru - An Experimental Phishing Kit Detection Tool, We have prepared this article well for you to read and retrieve information from it. hopefully fill the posts Article Linux, Article Mac, Article Miteru, Article Phishing, Article Phishing Detection, Article Python, Article Windows, we write this you can understand. Alright, happy reading.

Title : Miteru - An Experimental Phishing Kit Detection Tool
link : Miteru - An Experimental Phishing Kit Detection Tool

ALSO READ


Miteru - An Experimental Phishing Kit Detection Tool

Miteru is an experimental phishing kit detection tool.

How it works

Features
  • Phishing kit detection & collection.
  • Slack notification.
  • Threading.

Installation
$ precious rock install miteru

Usage
$ miteru Commands:   miteru execute         # Execute the crawler   miteru assistance [COMMAND]  # Describe available commands or ane specific command
$ miteru assistance execute Usage:   miteru execute  Options:   [--auto-download], [--no-auto-download]              # Enable or disable auto-download of phishing kits   [--directory-traveling], [--no-directory-traveling]  # Enable or disable directory traveling   [--download-to=DOWNLOAD_TO]                          # Directory to download file(s)                                                        # Default: /tmp   [--post-to-slack], [--no-post-to-slack]              # Post a message to Slack if it detects a phishing kit   [--size=N]                                           # Number of urlscan.io's results. (Max: 10,000)                                                        # Default: 100   [--threads=N]                                        # Number of threads to role                                                        # Default: ten   [--verbose], [--no-verbose]                                                           # Default: truthful  Execute the crawler
$ miteru execute ... https://dummy1.com: it doesn't incorporate a phishing kit. https://dummy2.com: it doesn't incorporate a phishing kit. https://dummy3.com: it doesn't incorporate a phishing kit. https://dummy4.com: it powerfulness incorporate a phishing kit (dummy.zip).

Using Docker (alternative if you lot don't install Ruby)
$ git clone https://github.com/ninoseki/miteru.git $ cd miteru/docker $ docker gear upward -t miteru . $ docker run miteru # ex. auto-download detected phishing kit(s) into host machines's /tmp directory $ docker run -v /tmp:/tmp miteru execute --auto-download

Aasciinema cast


Note
For using --post-to-slack feature, you lot should laid the next surroundings variables:
  • SLACK_WEBHOOK_URL: Your Slack Webhook URL.
  • SLACK_CHANNEL: Slack channel to post a message (default: "#general").

Alternatives




Thus the article Miteru - An Experimental Phishing Kit Detection Tool

That's all the article Miteru - An Experimental Phishing Kit Detection Tool this time, hopefully can benefit you all. okay, see you in another article posting.

You are now reading the article Miteru - An Experimental Phishing Kit Detection Tool with the link address https://mederc.blogspot.com/2019/09/miteru-experimental-phishing-kit.html

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel