Trawler alternatives

Looking for an alternative tool to replace Trawler? During the review of Trawler we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. Gophish (phishing toolkit)
  2. King Phisher (Phishing campaign toolkit)
  3. Wifiphisher (phishing attack tool for WiFi)

These tools are ranked as the best alternatives to Trawler.

Alternatives (by score)

85

Gophish

Introduction

Phishing tools are a good option to test the security awareness within an organization. By setting up a phishing project, the tester can find out how many people in an organization fall for a predefined trap.

Project details

Gophish is written in Golang.

Strengths and weaknesses

  • + More than 10 contributors
  • + More than 1000 GitHub stars
  • + The source code of this software is available

    Typical usage

    • Security awareness

    Gophish review

    85

    King Phisher

    Introduction

    None

    Project details

    Strengths and weaknesses

    • + The source code of this software is available

      Typical usage

      • Phishing attacks

      King Phisher review

      78

      Wifiphisher

      Introduction

      Wifiphisher would have a good usage in security assessments to obtain credentials. In that regard it is considered to be an offensive tool, especially considering it could be used to infect the systems of victims with malware. Wifiphisher is not a brute forcing tool, but more focused to perform a social engineering attack.

      Project details

      Wifiphisher is written in Python.

      Strengths and weaknesses

      • + More than 25 contributors
      • + More than 5000 GitHub stars
      • + The source code of this software is available

        Typical usage

        • Phishing attacks
        • WiFi security analysis

        Wifiphisher review

        76

        Bleach

        Introduction

        Bleach is a library for Django that can sanitize HTML by escaping and stripping harmful content. It provides a filter for untrusted content and disarms potential unwanted scripts from the input. This may be useful to apply to data that is transmitted via HTML forms or otherwise.

        Project details

        Bleach is written in Python.

        Strengths and weaknesses

        • + More than 25 contributors
        • + More than 1000 GitHub stars
        • + The source code of this software is available

          Typical usage

          • Data sanitizing

          Bleach review

          64

          CHIRON ELK

          Introduction

          CHIRON is a tool to provide network analytics based on the ELK stack. It is combined with Machine Learning threat detection using the Aktaion framework. Typical usage of the tool is home use and get the visibility of home internet devices. By leveraging the Aktaion framework, it helps with detection threats like ransomware, phishing, or other malicious traffic.

          Project details

          CHIRON ELK is written in Python.

          Strengths and weaknesses

          • + The source code of this software is available
          • - No releases on GitHub available

          Typical usage

          • Network analysis
          • Network security monitoring
          • Network traffic analysis
          • Threat discovery

          CHIRON ELK review

          59

          socat

          Introduction

          Socat is a tool to share data between systems. It can leverage an existing connection, or set up a new channel between two systems. This can be useful to relay traffic, do a quick data transfer, or test other systems. Another option is to use it on the local system to add an encrypted channel.

          Project details

          socat is written in C.

          Strengths and weaknesses

          • + The source code of this software is available
          • + Well-known tool

            Typical usage

            • Data encryption
            • Data transfers

            socat review

            70

            Xplico

            Introduction

            With Xplico analysis can be performed on captured internet traffic. The data stored in a pcap file can then be displayed and the related protocol data can be extracted from the capture file. This may include emails, HTTP sessions, VoIP calls, or anything that can be recognized and stored.

            Project details

            Some relevant tool missing as an alternative to Trawler? Please contact us with your suggestion.