Trawler alternatives
Looking for an alternative tool to replace Trawler? During the review of Trawler we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.
Top 3
- Gophish (phishing toolkit)
- King Phisher (Phishing campaign toolkit)
- Wifiphisher (phishing attack tool for WiFi)
These tools are ranked as the best alternatives to Trawler.
Alternatives (by score)
Gophish
Introduction
Phishing tools are a good option to test the security awareness within an organization. By setting up a phishing project, the tester can find out how many people in an organization fall for a predefined trap.
Project details
Gophish is written in Golang.
Strengths and weaknesses
- + More than 10 contributors
- + More than 1000 GitHub stars
- + The source code of this software is available
Typical usage
- Security awareness
King Phisher
Introduction
NoneProject details
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Phishing attacks
Wifiphisher
Introduction
Wifiphisher would have a good usage in security assessments to obtain credentials. In that regard it is considered to be an offensive tool, especially considering it could be used to infect the systems of victims with malware. Wifiphisher is not a brute forcing tool, but more focused to perform a social engineering attack.
Project details
Wifiphisher is written in Python.
Strengths and weaknesses
- + More than 25 contributors
- + More than 5000 GitHub stars
- + The source code of this software is available
Typical usage
- WiFi security analysis
- Phishing attacks
Bleach
Introduction
Bleach is a library for Django that can sanitize HTML by escaping and stripping harmful content. It provides a filter for untrusted content and disarms potential unwanted scripts from the input. This may be useful to apply to data that is transmitted via HTML forms or otherwise.
Project details
Bleach is written in Python.
Strengths and weaknesses
- + More than 25 contributors
- + More than 1000 GitHub stars
- + The source code of this software is available
Typical usage
- Data sanitizing
CHIRON ELK
Introduction
CHIRON is a tool to provide network analytics based on the ELK stack. It is combined with Machine Learning threat detection using the Aktaion framework. Typical usage of the tool is home use and get the visibility of home internet devices. By leveraging the Aktaion framework, it helps with detection threats like ransomware, phishing, or other malicious traffic.
Project details
CHIRON ELK is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - No releases on GitHub available
Typical usage
- Network analysis
- Network security monitoring
- Network traffic analysis
- Threat discovery
Xplico
Introduction
With Xplico analysis can be performed on captured internet traffic. The data stored in a pcap file can then be displayed and the related protocol data can be extracted from the capture file. This may include emails, HTTP sessions, VoIP calls, or anything that can be recognized and stored.
Project details
socat
Introduction
Socat is a tool to share data between systems. It can leverage an existing connection, or set up a new channel between two systems. This can be useful to relay traffic, do a quick data transfer, or test other systems. Another option is to use it on the local system to add an encrypted channel.
Project details
socat is written in C.
Strengths and weaknesses
- + The source code of this software is available
- + Well-known tool
Typical usage
- Data encryption
- Data transfers
Some relevant tool missing as an alternative to Trawler? Please contact us with your suggestion.