A set of utilities used to assist with identify potential phishing websites and downloading potentially malicious content.
THIS PROJECT CURRENTLY UNDER DEVELOPMENT AND IT NOT READY FOR TESTING. PLEASE STAR OR WATCH THIS PROJECTS FOR FUTURE UPDATES AS I CONTINUE TO UPDATE IT
You can find more information about this tool during my presentation at DerbyCon 2019. Please visit my blog for the slides and a link to the video.
trawl
includes the following services (containers):
- entrails (MongoDB which contains 3 document models)
- spotter (spotter is used to spot potential malicious URLs)
- trawler (trawler is used to scrape websites for malicious content)
- Chum (chum is a RabbitMQ queue used by both spotter and trawler)
trawl
is designed with Docker in mind and is catered towards rapid setup and deployment. The general architecture can be seen below:
- Docker-Compose
To begin using trawl
make sure you have docker and docker-compose installed on your system and then you must clone the repository:
git clone [email protected]:swimlane/trawl.git
change directories into the trawl
folder and run
docker-compose up
This will begin creating and setting up all services.