{"id":21357,"date":"2022-01-23T14:36:04","date_gmt":"2022-01-23T14:36:04","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=21357"},"modified":"2022-01-23T14:36:08","modified_gmt":"2022-01-23T14:36:08","slug":"kit_hunter","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/kit_hunter\/","title":{"rendered":"Kit_Hunter : A Basic Phishing Kit Scanner For Dedicated And Semi-Dedicated Hosting"},"content":{"rendered":"\n<p><strong>Kit_Hunter<\/strong> is a personal project to learn Python, and a basic scanning tool that will search directories and locate phishing kits based on established markers. As detection happens, a report is generated for administrators.<\/p>\n\n\n\n<p>By default the script will generate a report that shows the files that were detected as potentially problematic, list the markers that indicated them as problematic (a.k.a. tags), and then show the exact line of code where the detection happened.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhoP2qqV0hUngEm6LanuEVG_d1Q1OpTURRUGx2tjCbam9C88uP3XUnWM-OtRpwizI4J7ewLmKKs3r2NjFiQjvC3yeXmGCok_Uj8kxc-aGJlyk4VwTngpivZKFpA6H-9ZSH1wDWhQ-0Uv-W1izzNZTGOLBuxh-lFa6IjM--90IOUW1oKdV4ituQ_zU8E=s707\" alt=\"\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Help<\/strong><\/p>\n\n\n\n<p>To get quick help:&nbsp;<code><strong>python3 kit_hunter_2.py -h<\/strong><\/code><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/SteveD3\/kit_hunter#default-scan\"><\/a><strong>Default scan<\/strong><\/p>\n\n\n\n<p>To launch a full scan using the default settings:&nbsp;<code><strong>python3 kit_hunter_2.py<\/strong><\/code><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/SteveD3\/kit_hunter#quick-scan\"><\/a><strong>Quick scan<\/strong><\/p>\n\n\n\n<p>To launch a quick scan, using minimal detection rules:&nbsp;<code><strong>python3 kit_hunter_2.py -q<\/strong><\/code><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/SteveD3\/kit_hunter#custom-scan\"><\/a><strong>Custom scan<\/strong><\/p>\n\n\n\n<p>To launch a custom scan:&nbsp;<code><strong>python3 kit_hunter_2.py -c<\/strong><\/code><\/p>\n\n\n\n<p><strong>Note:<\/strong>&nbsp;When using the&nbsp;<code><strong>-c<\/strong><\/code>&nbsp;switch, you must place a tag file in the same location as Kit Hunter. You can name this file whatever you want, but the extension must be&nbsp;<code><strong>.tag<\/strong><\/code>. Please remember that the formatting is important. There should only be one item per line, and no whitespaces. You can look at the other tag files if you need examples.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/SteveD3\/kit_hunter#directory-selected-scanning\"><\/a><strong>Directory selected scanning<\/strong><\/p>\n\n\n\n<p>You can run&nbsp;<code><strong>kit_hunter_2.py<\/strong><\/code>&nbsp;from any location using the&nbsp;<code><strong>-d<\/strong><\/code>&nbsp;switch to select a directory to scan:<\/p>\n\n\n\n<p><code><strong>python3 kit_hunter_2.py -d \/path\/to\/directory<\/strong><\/code><\/p>\n\n\n\n<p>However, it is easier if you place&nbsp;<code><strong>kit_hunter_2.py<\/strong><\/code>&nbsp;in the directory above your web root (e.g.&nbsp;<code><strong>\/www\/<\/strong><\/code>&nbsp;or<strong>&nbsp;<code>\/public_html<\/code><\/strong><code>\/<\/code>) and call the script from there.<\/p>\n\n\n\n<p>The final report will be generated in the directory being scanned.<\/p>\n\n\n\n<p>In my usage, I call Kit Hunter from my&nbsp;<code><strong>\/kit\/download\/<\/strong><\/code>&nbsp;directory where new phishing kits are saved. My reports are then generated and saved to that folder. However, if I call Kit Hunter and scan my&nbsp;<code><strong>\/PHISHING\/Archive\/<\/strong><\/code>&nbsp;folder using the&nbsp;<code>-d<\/code>&nbsp;switch, then the report will save to&nbsp;<code><strong>\/PHISHING\/Archive\/<\/strong><\/code>.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/SteveD3\/kit_hunter#shell-detection\"><\/a><strong>Shell detection<\/strong><\/p>\n\n\n\n<p>This latest release of Kit Hunter comes with shell detection. Shell scripts are often packaged with phishing kits, or used to deploy phishing kits on webservers. Kit Hunter will scan for some common shell script elements. The process works exactly the same way as regular scanning, only the shell detections are called with the&nbsp;<code>-s<\/code>&nbsp;switch. This is a standalone scan, so you can&#8217;t run it with other types. You can however leverage the&nbsp;<code><strong>-m<\/strong><\/code>&nbsp;and&nbsp;<code>-l<\/code>&nbsp;flags with shell scanning. See the script&#8217;s help section for more details.<\/p>\n\n\n\n<p>Once scanning is complete, output from the script will point you to the location of the saved scan report.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/SteveD3\/kit_hunter#tag-files\"><\/a><strong>Tag Files<\/strong><\/p>\n\n\n\n<p>When it comes to the tag files, there are 41 tag files shipping with v2.5.8 Kit Hunter. These tag files detect targeted phishing campaigns, as well as various types of phishing tricks, such as obfuscation, templating, theming, and even branded kits like Kr3pto and Ex-Robotos. New tag files will be added, and existing tag files will be updated on a semi-regular basis. See the changelog for details.<\/p>\n\n\n\n<p>As was the case with v1.0, the longer the tag file is, the longer it will take for the script to read it.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/SteveD3\/kit_hunter\">Download<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Kit_Hunter is a personal project to learn Python, and a basic scanning tool that will search directories and locate phishing kits based on established markers. As detection happens, a report is generated for administrators. By default the script will generate a report that shows the files that were detected as potentially problematic, list the markers [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":21365,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4611,4609,4610,4612],"class_list":["post-21357","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-dedicated","tag-kit_hunter","tag-phishing-kit-scanner","tag-semi-dedicated-hosting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kit_Hunter : A Basic Phishing Kit Scanner For Dedicated<\/title>\n<meta name=\"description\" content=\"Kit_Hunter is a personal project to learn Python, and a basic scanning tool that will search directories and locate phishing kits.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kit_Hunter : A Basic Phishing Kit Scanner For Dedicated\" \/>\n<meta property=\"og:description\" content=\"Kit_Hunter is a personal project to learn Python, and a basic scanning tool that will search directories and locate phishing kits.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-23T14:36:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-23T14:36:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Kit_Hunter : A Basic Phishing Kit Scanner For Dedicated And Semi-Dedicated Hosting\",\"datePublished\":\"2022-01-23T14:36:04+00:00\",\"dateModified\":\"2022-01-23T14:36:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/\"},\"wordCount\":514,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728\",\"keywords\":[\"Dedicated\",\"Kit_Hunter\",\"Phishing Kit Scanner\",\"Semi-Dedicated Hosting\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/\",\"name\":\"Kit_Hunter : A Basic Phishing Kit Scanner For Dedicated\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728\",\"datePublished\":\"2022-01-23T14:36:04+00:00\",\"dateModified\":\"2022-01-23T14:36:08+00:00\",\"description\":\"Kit_Hunter is a personal project to learn Python, and a basic scanning tool that will search directories and locate phishing kits.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kit_hunter\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kit_Hunter : A Basic Phishing Kit Scanner For Dedicated","description":"Kit_Hunter is a personal project to learn Python, and a basic scanning tool that will search directories and locate phishing kits.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/kit_hunter\/","og_locale":"en_US","og_type":"article","og_title":"Kit_Hunter : A Basic Phishing Kit Scanner For Dedicated","og_description":"Kit_Hunter is a personal project to learn Python, and a basic scanning tool that will search directories and locate phishing kits.","og_url":"https:\/\/kalilinuxtutorials.com\/kit_hunter\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-01-23T14:36:04+00:00","article_modified_time":"2022-01-23T14:36:08+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/kit_hunter\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/kit_hunter\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Kit_Hunter : A Basic Phishing Kit Scanner For Dedicated And Semi-Dedicated Hosting","datePublished":"2022-01-23T14:36:04+00:00","dateModified":"2022-01-23T14:36:08+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/kit_hunter\/"},"wordCount":514,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/kit_hunter\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728","keywords":["Dedicated","Kit_Hunter","Phishing Kit Scanner","Semi-Dedicated Hosting"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/kit_hunter\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/kit_hunter\/","url":"https:\/\/kalilinuxtutorials.com\/kit_hunter\/","name":"Kit_Hunter : A Basic Phishing Kit Scanner For Dedicated","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/kit_hunter\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/kit_hunter\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728","datePublished":"2022-01-23T14:36:04+00:00","dateModified":"2022-01-23T14:36:08+00:00","description":"Kit_Hunter is a personal project to learn Python, and a basic scanning tool that will search directories and locate phishing kits.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/kit_hunter\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/kit_hunter\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgYxEgseMFQnx4WrxMs_bWWQYlhtYDuT3880O0-hs6_w7IbGoOrr4OIv64uNonSon0mLug__wFRPmzxopLjHYngszGjK5jz62vG3s0FzyheZWEWY8U0DjDd4Y_QgdOIFDAs3lWNwmxWzR-aaJnYnGBYwxDl4FriVoVIhpvAiSJtN_LVemzUlYORdBKA=s728","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":5050,"url":"https:\/\/kalilinuxtutorials.com\/miteru-phishing-kit-detection\/","url_meta":{"origin":21357,"position":0},"title":"Miteru : An Experimental Phishing Kit Detection Tool","author":"R K","date":"May 20, 2019","format":false,"excerpt":"Miteru is an experimental phishing kit detection tool. Following are the features that can be used for the tool; Phishing kit detection & collection.\u00a0Slack notification.\u00a0Threading. How it works? It collects phishy URLs from the following feeds:CertStream-Suspicious feed via urlscan.ioOpenPhish feed via urlscan.ioPhishTank feed via urlscan.ioAyashige feedIt checks each phishy URL\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":21978,"url":"https:\/\/kalilinuxtutorials.com\/spamscanner\/","url_meta":{"origin":21357,"position":1},"title":"Spamscanner : Spam Scanner Is The Best Anti-Spam, Email Filtering, And Phishing Prevention Service","author":"R K","date":"February 23, 2022","format":false,"excerpt":"Spamscanner is a tool and service built by\u00a0@niftylettuce\u00a0after hitting countless roadblocks with existing spam-detection solutions. In other words, it's our current\u00a0plan\u00a0for\u00a0spam. Our goal is to build and utilize a scalable, performant, simple, easy to maintain, and powerful API for use in our service at\u00a0Forward Email\u00a0to limit spam and provide other\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiBGJj6TDcURS0rad8vPnsoLlBf0k8AdHX4cTYIkoDDDlbe3357VD6_XGZqdm13Vye8-VjQuQW0lWNkPcZyty0Z3gRPZewEjIVdafxNYdVbvEjgkqNkHO12A71KAIWfpCBsf1U1vtzM-LNyKV5rkcf22dFX9yD_FXmvBvkJo-bxaMdpPmGrJc2BF5E-=s1127","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiBGJj6TDcURS0rad8vPnsoLlBf0k8AdHX4cTYIkoDDDlbe3357VD6_XGZqdm13Vye8-VjQuQW0lWNkPcZyty0Z3gRPZewEjIVdafxNYdVbvEjgkqNkHO12A71KAIWfpCBsf1U1vtzM-LNyKV5rkcf22dFX9yD_FXmvBvkJo-bxaMdpPmGrJc2BF5E-=s1127 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiBGJj6TDcURS0rad8vPnsoLlBf0k8AdHX4cTYIkoDDDlbe3357VD6_XGZqdm13Vye8-VjQuQW0lWNkPcZyty0Z3gRPZewEjIVdafxNYdVbvEjgkqNkHO12A71KAIWfpCBsf1U1vtzM-LNyKV5rkcf22dFX9yD_FXmvBvkJo-bxaMdpPmGrJc2BF5E-=s1127 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiBGJj6TDcURS0rad8vPnsoLlBf0k8AdHX4cTYIkoDDDlbe3357VD6_XGZqdm13Vye8-VjQuQW0lWNkPcZyty0Z3gRPZewEjIVdafxNYdVbvEjgkqNkHO12A71KAIWfpCBsf1U1vtzM-LNyKV5rkcf22dFX9yD_FXmvBvkJo-bxaMdpPmGrJc2BF5E-=s1127 2x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiBGJj6TDcURS0rad8vPnsoLlBf0k8AdHX4cTYIkoDDDlbe3357VD6_XGZqdm13Vye8-VjQuQW0lWNkPcZyty0Z3gRPZewEjIVdafxNYdVbvEjgkqNkHO12A71KAIWfpCBsf1U1vtzM-LNyKV5rkcf22dFX9yD_FXmvBvkJo-bxaMdpPmGrJc2BF5E-=s1127 3x"},"classes":[]},{"id":23526,"url":"https:\/\/kalilinuxtutorials.com\/opensquat\/","url_meta":{"origin":21357,"position":2},"title":"OpenSquat : Detection Of Phishing Domains And Domain Squatting.","author":"R K","date":"March 30, 2022","format":false,"excerpt":"OpenSquat is an opensource Intelligence (OSINT) security tool to identify\u00a0cyber squatting\u00a0threats to specific companies or domains, such as: Phishing campaignsDomain squattingTypo squattingBit squattingIDN homograph attacksDoppen ganger domainsOther brand\/domain related scams It does support some key features such as: Automatic newly registered domain updating (once a day)Levenshtein distance to calculate word\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiL3qH7RvS3uuUo6zGXaZA2iC8Y3dOmYCuISjxGG56zhizp3XGw1e0Hn2Ocp1eHRMjBpMxjRAL5LkZBPPMacBPVkvXYMFFVQJwgO2N9wBSc_D4b_Xe6r3iv-G3jRjhmANcnF1FXKL2MlCVB309zpQLGa18YGRxcM9P2ymUptMI18iIgeGBP_rTmoPOU\/s728\/openSquat_logo%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiL3qH7RvS3uuUo6zGXaZA2iC8Y3dOmYCuISjxGG56zhizp3XGw1e0Hn2Ocp1eHRMjBpMxjRAL5LkZBPPMacBPVkvXYMFFVQJwgO2N9wBSc_D4b_Xe6r3iv-G3jRjhmANcnF1FXKL2MlCVB309zpQLGa18YGRxcM9P2ymUptMI18iIgeGBP_rTmoPOU\/s728\/openSquat_logo%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiL3qH7RvS3uuUo6zGXaZA2iC8Y3dOmYCuISjxGG56zhizp3XGw1e0Hn2Ocp1eHRMjBpMxjRAL5LkZBPPMacBPVkvXYMFFVQJwgO2N9wBSc_D4b_Xe6r3iv-G3jRjhmANcnF1FXKL2MlCVB309zpQLGa18YGRxcM9P2ymUptMI18iIgeGBP_rTmoPOU\/s728\/openSquat_logo%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiL3qH7RvS3uuUo6zGXaZA2iC8Y3dOmYCuISjxGG56zhizp3XGw1e0Hn2Ocp1eHRMjBpMxjRAL5LkZBPPMacBPVkvXYMFFVQJwgO2N9wBSc_D4b_Xe6r3iv-G3jRjhmANcnF1FXKL2MlCVB309zpQLGa18YGRxcM9P2ymUptMI18iIgeGBP_rTmoPOU\/s728\/openSquat_logo%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":32641,"url":"https:\/\/kalilinuxtutorials.com\/jeorg-security-defense-test-drives\/","url_meta":{"origin":21357,"position":3},"title":"JEOrg Security Defense Test Drives &#8211; Elevating Email Protection And Fraud Detection","author":"Varshini","date":"April 5, 2024","format":false,"excerpt":"In the digital age, safeguarding our digital communication is paramount. \"JEOrg Security Defense Test Drives\" embarks on a mission to fortify email security and unveil deceptive practices, equipping users with the tools and knowledge to combat phishing and fraud. This article explores the innovative solutions and strategies at the heart\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkUnxutZNJGIJ_hbdaZhQvAQ27K88SwBs7Mlm1Hj7BG4Q__syduA2aqKunEiZ-TI12CQXk5wXuzoK8Q4uqDQevSl-fZTpu4jhdSE2dksqUEPxLaAqYMKwZPI4PhIFFGdBDclA0uQPJmFXx60JxlyxBADBP9Wer6BYb0XlaIcZqFAICbgMmf3wVVy8uLlDu\/s16000\/JEOrg%20Security%20Defense%20Test%20Drives.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkUnxutZNJGIJ_hbdaZhQvAQ27K88SwBs7Mlm1Hj7BG4Q__syduA2aqKunEiZ-TI12CQXk5wXuzoK8Q4uqDQevSl-fZTpu4jhdSE2dksqUEPxLaAqYMKwZPI4PhIFFGdBDclA0uQPJmFXx60JxlyxBADBP9Wer6BYb0XlaIcZqFAICbgMmf3wVVy8uLlDu\/s16000\/JEOrg%20Security%20Defense%20Test%20Drives.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkUnxutZNJGIJ_hbdaZhQvAQ27K88SwBs7Mlm1Hj7BG4Q__syduA2aqKunEiZ-TI12CQXk5wXuzoK8Q4uqDQevSl-fZTpu4jhdSE2dksqUEPxLaAqYMKwZPI4PhIFFGdBDclA0uQPJmFXx60JxlyxBADBP9Wer6BYb0XlaIcZqFAICbgMmf3wVVy8uLlDu\/s16000\/JEOrg%20Security%20Defense%20Test%20Drives.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkUnxutZNJGIJ_hbdaZhQvAQ27K88SwBs7Mlm1Hj7BG4Q__syduA2aqKunEiZ-TI12CQXk5wXuzoK8Q4uqDQevSl-fZTpu4jhdSE2dksqUEPxLaAqYMKwZPI4PhIFFGdBDclA0uQPJmFXx60JxlyxBADBP9Wer6BYb0XlaIcZqFAICbgMmf3wVVy8uLlDu\/s16000\/JEOrg%20Security%20Defense%20Test%20Drives.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkUnxutZNJGIJ_hbdaZhQvAQ27K88SwBs7Mlm1Hj7BG4Q__syduA2aqKunEiZ-TI12CQXk5wXuzoK8Q4uqDQevSl-fZTpu4jhdSE2dksqUEPxLaAqYMKwZPI4PhIFFGdBDclA0uQPJmFXx60JxlyxBADBP9Wer6BYb0XlaIcZqFAICbgMmf3wVVy8uLlDu\/s16000\/JEOrg%20Security%20Defense%20Test%20Drives.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkUnxutZNJGIJ_hbdaZhQvAQ27K88SwBs7Mlm1Hj7BG4Q__syduA2aqKunEiZ-TI12CQXk5wXuzoK8Q4uqDQevSl-fZTpu4jhdSE2dksqUEPxLaAqYMKwZPI4PhIFFGdBDclA0uQPJmFXx60JxlyxBADBP9Wer6BYb0XlaIcZqFAICbgMmf3wVVy8uLlDu\/s16000\/JEOrg%20Security%20Defense%20Test%20Drives.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":9787,"url":"https:\/\/kalilinuxtutorials.com\/jeopardize-a-low-cost-threat-intelligenceresponse-tool\/","url_meta":{"origin":21357,"position":4},"title":"Jeopardize : A Low Cost Threat Intelligence&#038;Response Tool","author":"R K","date":"March 19, 2020","format":false,"excerpt":"Jeopardize is a low(zero) cost threat intelligence&response tool against phishing domains. Jeopardize tool is developed to provide basic threat intelligence&response capabilities against phishing domains at the minimum cost as possible. It detects registered phishing domain candidates (typosquatting, homograph etc.), analyzes them and assigns a risk score to them. After then,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9765,"url":"https:\/\/kalilinuxtutorials.com\/pickl3\/","url_meta":{"origin":21357,"position":5},"title":"Pickl3 : Windows Active User Credential Phishing Tool","author":"R K","date":"March 18, 2020","format":false,"excerpt":"Pickl3 is a Windows active user credential phishing tool.You can execute the Pickl3 and phish the target user credential. Operational Usage - 1 Nowadays, since the operating system of many end users is Windows 10, we cannot easily steal account information with Mimikatz-like projects like the old days. Using Pickl3,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/21357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=21357"}],"version-history":[{"count":5,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/21357\/revisions"}],"predecessor-version":[{"id":21649,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/21357\/revisions\/21649"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/21365"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=21357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=21357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=21357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}