Social Engineering Tools

CATPHISH – Phishing ToolKit

Written by Mubassir patel

CATPHISH

Generate similar-looking domains for phishing attacks. Check expired domains and their categorized domain status to evade proxy categorization. Whitelisted domains are perfect for your C2 servers. Perfect for Red Team engagements.

Installation

bundle install

Current Algorithms

  • SingularOrPluralise
  • prependOrAppend
  • doubleExtensions
  • mirrorization
  • homoglyphs
  • dashOmission
  • Punycode

Version 1.1.0:

The parser for command line options is modified to compensate with the new expired feature. This new option structure gives the tool a new look and more organized.

Usage

Running the tool:

catphish.rb [global options] COMMAND [command options]

Options:

COMMANDS
  generate                    Generate domains
  expired                     Find available expired domains
(experimental)

Additional help
  catphish.rb COMMAND -h

Global Options
  -l, --logo, --no-logo                      ASCII art banner
                                             (default: true)
  -c, --column-header, --no-column-header    Header for each column
                                             of the output (default:
                                             true)
  -D, --Domain=<s>                           Target domain to analyze
  -V, --Verbose                              Show all domains,
                                             including non-available
                                             ones
  -h, --help                                 Show this message

Generate all type:

catphish.rb -D DOMAIN generate -A

Check available expired domains:

catphish.rb -D DOMAIN expired

Check against a specific domain for categorization status:

catphish.rb -D DOMAIN expired -c

Check all available expired domains against a specific vendor

catphish.rb -D DOMAIN expired -p PROXY_TYPE

Docker

You can also run the tool with Docker! This lets you try it out without any of the required dependencies (ruby), except Docker itself. This presumes that you have the docker daemon installed. If not, see Docker’s documentation.

First, build the container

$ cd path/to/repository

# Generate a tag so we know how to find the container later to run it. You can use anything (latest is common);
# here the git hash is used.
$ TAG=$(git rev-parse --short HEAD)

# Run the build
$ docker build --tag "catphish:${TAG}" .

# Eventually docker will print something like:
#
#   Successfully built 8f0b8bfe0c41
#   Successfully tagged catphish:f947517

Perfect! Now, you can execute  via Docker:

$ docker run \
    --rm=true \
    "catphish:${TAG}" \
        --Domain ring0labs.com \
        --All

In Action

alt tag

COPYRIGHT

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.

About the author

Mubassir patel

Mubassir is a founder and developer of this site. He is a computer science engineer. He has a very deep interest in ethical hacking, penetration testing, website development and including all technology topic.

Leave a Comment