Check phishing links using data from PhishTank.
cargo build --release
Make sure you have the dataset from phishtank.com. See the PhishTank developer docs for how to obtain the dataset. You need to download the json dataset.
Then launch the phisher server process like this:
phisher --phishtank <phishtank-json-file>
Loading the dataset will take a while, once it is done, it will print out the number of phishes loaded, and the socket where it will listen for potentially phishy URLs.
You can check if an URL is phishy or not by connecting to the socket and passing one URL at the time to the socket. For each URL the server will respond if it's phishy or good.
Once the client is done, it can drop the connection gracefully by issuing the
command, or simply drop the connection.
An example session can be like this:
% socat - UNIX-CONNECT:/tmp/phisher https://volse.no good url. https://safravideos.com/login it's a phish! bye bye.
Copyright (C) 2019 Harald Eilertsen <email@example.com> This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <https://www.gnu.org/licenses/>.