{"id":13475368,"url":"https://github.com/ring0lab/catphish","last_synced_at":"2025-03-27T00:31:19.932Z","repository":{"id":76044925,"uuid":"71838499","full_name":"ring0lab/catphish","owner":"ring0lab","description":"CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM. ","archived":false,"fork":false,"pushed_at":"2018-10-16T12:57:25.000Z","size":431,"stargazers_count":597,"open_issues_count":4,"forks_count":122,"subscribers_count":42,"default_branch":"master","last_synced_at":"2024-08-01T16:38:58.134Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"Ruby","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ring0lab.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2016-10-24T22:48:51.000Z","updated_at":"2024-07-27T20:22:44.000Z","dependencies_parsed_at":null,"dependency_job_id":"b6b64b7d-ff7d-412d-ba6b-1186eddb729f","html_url":"https://github.com/ring0lab/catphish","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ring0lab%2Fcatphish","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ring0lab%2Fcatphish/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ring0lab%2Fcatphish/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ring0lab%2Fcatphish/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ring0lab","download_url":"https://codeload.github.com/ring0lab/catphish/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":245760688,"owners_count":20667886,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-07-31T16:01:19.819Z","updated_at":"2025-03-27T00:31:19.630Z","avatar_url":"https://github.com/ring0lab.png","language":"Ruby","readme":"# CATPHISH\nGenerate similar-looking domains for phishing attacks. Check expired domains and their categorized domain status to evade proxy categorization. Whitelisted domains are perfect for your C2 servers. Perfect for Red Team engagements. \n\n# Installation\n```\nbundle install\n```\n\n# Current Algorithms\n* SingularOrPluralise\n* prependOrAppend\n* doubleExtensions\n* mirrorization\n* homoglyphs\n* dashOmission\n* Punycode\n\nVersion 1.1.0:\n```\nThe parser for command line options is modified to compensate with the new expired feature. This new option structure gives the tool a new look and more organized.\n```\n\n# Usage\nRunning the tool:\n```\ncatphish.rb [global options] COMMAND [command options]\n```\nOptions:\n```\nCOMMANDS\n  generate                    Generate domains\n  expired                     Find available expired domains\n(experimental)\n\nAdditional help\n  catphish.rb COMMAND -h\n\nGlobal Options\n  -l, --logo, --no-logo                      ASCII art banner\n                                             (default: true)\n  -c, --column-header, --no-column-header    Header for each column\n                                             of the output (default:\n                                             true)\n  -D, --Domain=\u003cs\u003e                           Target domain to analyze\n  -V, --Verbose                              Show all domains,\n                                             including non-available\n                                             ones\n  -h, --help                                 Show this message\n```\nGenerate all type:\n```\ncatphish.rb -D DOMAIN generate -A\n```\nCheck available expired domains:\n```\ncatphish.rb -D DOMAIN expired\n```\nCheck against a specific domain for categorization status:\n```\ncatphish.rb -D DOMAIN expired -c\n```\nCheck all available expired domains against a specific vendor\n```\ncatphish.rb -D DOMAIN expired -p PROXY_TYPE\n```\n\n## Docker\n\nYou can also run the tool with Docker! This lets you try it out without any of the required dependencies (ruby), except\nDocker itself. This presumes that you have the docker daemon installed. If not, see\n[Docker's documentation](https://docs.docker.com/engine/installation/).\n\nFirst, build the container\n\n```\n$ cd path/to/repository\n\n# Generate a tag so we know how to find the container later to run it. You can use anything (latest is common);\n# here the git hash is used.\n$ TAG=$(git rev-parse --short HEAD)\n\n# Run the build\n$ docker build --tag \"catphish:${TAG}\" .\n\n# Eventually docker will print something like:\n#\n#   Successfully built 8f0b8bfe0c41\n#   Successfully tagged catphish:f947517\n\n```\n\nPerfect! Now, you can execute catphish via Docker:\n\n```\n$ docker run \\\n    --rm=true \\\n    \"catphish:${TAG}\" \\\n        --Domain ring0labs.com \\\n        --All\n```\n\n# In Action\n\n![alt tag](https://github.com/ring0lab/catphish/blob/master/image1.png)\n\n# COPYRIGHT\nThis program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.\n\nThis program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.\n\nYou should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.\n","funding_links":[],"categories":["Uncategorized","Tools","Ruby (88)","Social Engineering","Ruby","Social Engineering Tools","Tools by Category"],"sub_categories":["Uncategorized","Social Engineering Tools","Penetration Testing Report Templates","🌐 Website Monitoring \u0026 Analysis"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fring0lab%2Fcatphish","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fring0lab%2Fcatphish","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fring0lab%2Fcatphish/lists"}