Miteru : An Experimental Phishing Kit Detection Tool

Miteru is an experimental phishing kit detection tool. Following are the features that can be used for the tool;

  • Phishing kit detection & collection.
  • Slack notification.
  • Threading.

How it works?

Also Read : Mquery : YARA Malware Query Accelerator

Installation

$ gem install miteru

Usage

$ miteru
Commands:
miteru execute # Execute the crawler
miteru help [COMMAND] # Describe available

commands or one specific command

$ miteru help execute
Usage:
miteru execute

Options:
[–auto-download], [–no-auto-download] # Enable or disable auto-download of phishing kits
[–directory-traveling], [–no-directory-traveling] # Enable or disable directory traveling
[–download-to=DOWNLOAD_TO] # Directory to download file(s)
# Default: /tmp
[–post-to-slack], [–no-post-to-slack] # Post a message to Slack if it detects a phishing kit
[–size=N] # Number of urlscan.io’s results. (Max: 10,000)
# Default: 100
[–threads=N] # Number of threads to use
# Default: 10
[–verbose], [–no-verbose]
# Default: true

Execute the crawler
$ miteru execute

https://dummy1.com: it doesn’t contain a phishing kit.
https://dummy2.com: it doesn’t contain a phishing kit.
https://dummy3.com: it doesn’t contain a phishing kit.
https://dummy4.com: it might contain a phishing kit (dummy.zip).

Using Docker (alternative if you don’t install Ruby)

$ git clone https://github.com/ninoseki/miteru.git
$ cd miteru/docker
$ docker build -t miteru .
$ docker run miteru
ex. auto-download detected phishing kit(s) into host machines’s /tmp directory
$ docker run -v /tmp:/tmp miteru execute –auto-download

Aasciinema Cast

Note

For using --post-to-slack feature, you should set the following environment variables:

  • SLACK_WEBHOOK_URL: Your Slack Webhook URL.
  • SLACK_CHANNEL: Slack channel to post a message (default: “#general”).
R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

16 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

16 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

4 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago