GithubHelp home page GithubHelp logo

whogotpwned / phishing Goto Github PK

View Code? Open in Web Editor NEW

This project forked from mitchellkrogza/phishing

0.0 0.0 0.0 442 KB

Central Repository for Adding Domains / Links to the Phishing.Database project - https://github.com/mitchellkrogza/Phishing.Database/

phishing's Introduction

Phishing

Central Repository for Adding or Removing Domains / Links from the Phishing.Database project https://github.com/mitchellkrogza/Phishing.Database

Committing Phishing records

DNS systems can operate on the domain level (everything before the first /) while IE Squid-proxy or uBlock Origin can operate on both sides of the slashes.

The add-link is for domains that have been hacked, ie. a Wordpress site where the phishing script lies in a subfolder vs a subdomain.

This means if an entire domain is being used for phishing i.e. phishing.example.com, then add it to the domain list (add-domain). If the phishing threat resides inside a subfolder of the domain i.e. /sub/oath/phishing-script/payload.php then add it to the url list (add-link).

Add Phishing Domains

To add domains to this database send a Pull Request on the file https://github.com/mitchellkrogza/phishing/blob/main/add-domain

include the domain name only (no http / https)

Add Phishing Urls / Links

To add links / urls to this database send a Pull Request on the file https://github.com/mitchellkrogza/phishing/blob/main/add-link

Include the full link

False Positives

To be able to keep the whitelist as precise as possible, the Phishing DB are using 3 types of list.

  1. The first list is matching 1 on 1. This means if we should only whitelist IE. subdomain1.example.com but not subdomain2.example.com, then this is the list.
  2. The other list (ALL) is wildcard based. This means every subdomains from example.net and lover level such as subdomain1.example.net & subdomain2.example.net. This list also accepts full regex. Except from ending $ and \\ as this is done by automatically.
  3. The third list (RZD) will probably never be used... Read the full doc here before attemting to making changes to it: https://github.com/Ultimate-Hosts-Blacklist/whitelist/blob/script/README.rst#rzd

For better understanding of these speciallities, you are welcome to read the tools Readme.

phishing's People

Contributors

spirillen avatar mitchellkrogza avatar zachinquarantine avatar funilrys avatar wagonza avatar actually-akac avatar tsukuyomiotoko avatar tyw7 avatar smeinecke avatar allaway avatar kehpry avatar davidosipov avatar peterdavehello avatar quartzwarrior avatar theycallmecharlie avatar ph00lt0 avatar noahavrit avatar hb-cl avatar t-morgan avatar thomvivi avatar benolot avatar andre601 avatar lelas avatar mdmck10 avatar nousernameinhere avatar r15ch13 avatar segogithub avatar someguyx avatar steltek avatar tobiasstrebitzer avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.