aboutsummaryrefslogtreecommitdiffstats

Phisher

Check phishing links using data from PhishTank.

How to build

Make sure you have an up to date rust toolchain, any version supporting the 2018 edition should work.

cargo build --release

How to run

Make sure you have the dataset from phishtank.com. See the PhishTank developer docs for how to obtain the dataset. You need to download the json dataset.

Then launch the phisher server process like this:

phisher --phishtank <phishtank-json-file>

Loading the dataset will take a while, once it is done, it will print out the number of phishes loaded, and the socket where it will listen for potentially phishy URLs.

You can check if an URL is phishy or not by connecting to the socket and passing one URL at the time to the socket. For each URL the server will respond if it's phishy or good.

Once the client is done, it can drop the connection gracefully by issuing the bye command, or simply drop the connection.

An example session can be like this:

% socat - UNIX-CONNECT:/tmp/phisher
https://volse.no
good url.
https://safravideos.com/login
it's a phish!
bye
bye.

How to contribute

Send me patches, bugs, ideas by email or through Hubzilla/Mastodon/Diaspora etc on my hubzilla account.

License

Copyright (C) 2019  Harald Eilertsen <haraldei@anduin.net>

This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program.  If not, see <https://www.gnu.org/licenses/>.