{"id":13494796,"url":"https://github.com/elceef/dnstwist","last_synced_at":"2025-08-21T01:06:49.995Z","repository":{"id":33607331,"uuid":"37259508","full_name":"elceef/dnstwist","owner":"elceef","description":"Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation","archived":false,"fork":false,"pushed_at":"2025-04-15T18:41:47.000Z","size":4609,"stargazers_count":5140,"open_issues_count":14,"forks_count":803,"subscribers_count":152,"default_branch":"master","last_synced_at":"2025-05-07T10:52:32.036Z","etag":null,"topics":["dns","domains","fuzzing","homoglyph","homograph-attack","idn","osint","phishing","scanner","threat-hunting","threat-intelligence","typosquatting"],"latest_commit_sha":null,"homepage":"https://dnstwist.it","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/elceef.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null},"funding":{"custom":["https://paypal.me/elceef","https://blockchain.com/btc/address/1E1CEEFdNy1FDUdJaYMjtbYLAxLiAuchNd"]}},"created_at":"2015-06-11T12:24:17.000Z","updated_at":"2025-05-06T15:45:02.000Z","dependencies_parsed_at":"2023-01-15T01:37:50.504Z","dependency_job_id":"0d5e364a-2ae9-4bd9-bc5f-a196d3e7682b","html_url":"https://github.com/elceef/dnstwist","commit_stats":{"total_commits":602,"total_committers":42,"mean_commits":"14.333333333333334","dds":0.09302325581395354,"last_synced_commit":"7de1a7ac86b2c019106c0daf9572aa2e2aeb6261"},"previous_names":[],"tags_count":30,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/elceef%2Fdnstwist","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/elceef%2Fdnstwist/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/elceef%2Fdnstwist/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/elceef%2Fdnstwist/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/elceef","download_url":"https://codeload.github.com/elceef/dnstwist/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254129467,"owners_count":22019628,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["dns","domains","fuzzing","homoglyph","homograph-attack","idn","osint","phishing","scanner","threat-hunting","threat-intelligence","typosquatting"],"created_at":"2024-07-31T19:01:28.361Z","updated_at":"2025-05-14T11:03:08.461Z","avatar_url":"https://github.com/elceef.png","language":"Python","readme":"","funding_links":["https://paypal.me/elceef","https://blockchain.com/btc/address/1E1CEEFdNy1FDUdJaYMjtbYLAxLiAuchNd"],"categories":["Python","Domain Analysis","\u003ca id=\"a76463feb91d09b3d024fae798b92be6\"\u003e\u003c/a\u003e侦察\u0026\u0026信息收集\u0026\u0026子域名发现与枚举\u0026\u0026OSINT","Network Tools","Python (1887)","[](#table-of-contents) Table of contents","Understanding OSINT Fundamentals, according to [VEEXH](https://wondersmithrae.medium.com/a-beginners-guide-to-osint-investigation-with-maltego-6b195f7245cc):","threat-hunting","Tools","\u003ca id=\"3e622bff3199cf22fe89db026b765cd4\"\u003e\u003c/a\u003e工具","Network","DNS","Tools by Category"],"sub_categories":["Other Resources","\u003ca id=\"a695111d8e30d645354c414cb27b7843\"\u003e\u003c/a\u003eDNS","Intentionally Vulnerable Systems as Docker Containers","[](#domainip-investigation)Domain/IP investigation","Network Tools","\u003ca id=\"290e9ae48108d21d6d8b9ea9e74d077d\"\u003e\u003c/a\u003e钓鱼\u0026\u0026Phish","Forensics","WebTools","Purple Team","👤 Username \u0026 Identity Research","Docker Containers of Penetration Testing Distributions and Tools"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Felceef%2Fdnstwist","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Felceef%2Fdnstwist","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Felceef%2Fdnstwist/lists"}