This is the Windows app named Phishing Catcher whose latest release can be downloaded as phishing_catchersourcecode.zip. It can be run online in the free hosting provider OnWorks for workstations.
Download and run online this app named Phishing Catcher with OnWorks for free.
Follow these instructions in order to run this app:
- 1. Downloaded this application in your PC.
- 2. Enter in our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.
- 3. Upload this application in such filemanager.
- 4. Start any OS OnWorks online emulator from this website, but better Windows online emulator.
- 5. From the OnWorks Windows OS you have just started, goto our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.
- 6. Download the application and install it.
- 7. Download Wine from your Linux distributions software repositories. Once installed, you can then double-click the app to run them with Wine. You can also try PlayOnLinux, a fancy interface over Wine that will help you install popular Windows programs and games.
Wine is a way to run Windows software on Linux, but with no Windows required. Wine is an open-source Windows compatibility layer that can run Windows programs directly on any Linux desktop. Essentially, Wine is trying to re-implement enough of Windows from scratch so that it can run all those Windows applications without actually needing Windows.
SCREENSHOTS:
Phishing Catcher
DESCRIPTION:
phishing_catcher is a security monitoring tool designed to detect potential phishing domains in near real time by analyzing TLS certificate issuance events. It listens to Certificate Transparency (CT) logs through the CertStream API and evaluates newly issued certificates as they appear. Each certificate often contains one or more domain names, which the tool analyzes to determine whether they resemble suspicious or phishing-related domains. phishing_catcher applies a configurable scoring mechanism that assigns numeric values to certain keywords, patterns, or top-level domains found within certificate domain names. When a domain’s score exceeds predefined thresholds, it is flagged as potentially malicious and reported accordingly. It operates continuously, processing certificate updates as they arrive and displaying or logging domains that appear suspicious. This approach allows analysts, researchers, and security teams to identify phishing infrastructure early.
Features
- Real-time certificate monitoring using the CertStream API to track newly issued TLS certificates
- Configurable scoring system that evaluates domains based on suspicious keywords and TLDs
- Phishing detection heuristics that help identify domains likely used for phishing campaigns
- Customizable configuration files allowing users to modify detection rules and scoring weights
- Continuous monitoring workflow that processes certificate events as they occur
- Console and log reporting for flagged domains based on threat-level thresholds
Programming Language
Python
Categories
This is an application that can also be fetched from https://sourceforge.net/projects/phishing-catcher.mirror/. It has been hosted in OnWorks in order to be run online in an easiest way from one of our free Operative Systems.