The Phishing URL Checker is a Python-based tool designed to help identify potentially malicious URLs. It operates in two modes:
- CLI Mode: Command-line interface with color-coded outputs for safe and unsafe links.
- GUI Mode: Graphical user interface built with Tkinter for easy interaction.
This tool can also validate URLs anonymously using a headless browser with proxy support, ensuring your IP address is not exposed.
To install the dependancies safely use controlled environment
source env/bin/activate
- Python (>= 3.7)
- Pip: Ensure Python dependencies can be installed.
- Selenium: For headless browsing.
pip install selenium
- Google Chrome and ChromeDriver:
- Download ChromeDriver matching your Chrome version from ChromeDriver Downloads.
- Place it in your system's PATH or provide its absolute path in the script.
- TOR Proxy:
- Install and configure TOR for anonymous browsing.
- Ensure TOR is running on
127.0.0.1:9050
.
- Tkinter:
- Ensure Tkinter is installed for GUI support. On Linux, install it via:
sudo apt-get install python3-tk
- Stem:
- Install the required Python libraries:
pip install stem requests
- Install the required Python libraries:
- Required Libraries
pip install beautifulsoup4
- Detects phishing indicators in URLs.
- Supports anonymous URL validation via Selenium and a TOR proxy.
- CLI mode with a bright yellow banner and color-coded outputs.
- GUI mode with intuitive input and result display.
- Analyzes URL structure and hosting details.
- Clone the repository:
git clone https://github.com/Spiderssh/Phishing-checker.git cd Phishing-checker
- Install dependencies:
Save the file and exit (Ctrl+O, Enter, Ctrl+X).
pip install selenium sudo apt install tor -y sudo nano /etc/tor/torrc SocksPort 127.0.0.1:9050 ControlPort 9051
Verify that Tor is functioning correctly with the curl commandsudo systemctl start tor sudo systemctl enable tor sudo systemctl status tor
Use Tor as a Proxy To route traffic through Tor, you can configure SOCKScurl --socks5-hostname 127.0.0.1:9050 http://check.torproject.org
SOCKS5 Proxy: 127.0.0.1:9050 Control Port: 127.0.0.1:9051
Install proxychains
sudo apt install proxychains4 -y
Edit the proxychains configuration
sudo nano /etc/proxychains4.conf
Add the proxy details
socks5 127.0.0.1 9050
Run the script in CLI mode:
python Phishing-checker.py
Follow the prompts to enter URLs one by one. Type done
to finish and view the results.
Run the script in GUI mode:
python Phishing-checker.py --gui
A window will open where you can enter and analyze URLs.
- Phishing Indicators:
- Scans URLs for common phishing terms like
login
,secure
,verify
, etc. - Flags suspicious top-level domains (e.g.,
.xyz
,.click
).
- Scans URLs for common phishing terms like
- Anonymous Validation:
- Uses Selenium with a headless Chrome browser.
- Routes traffic through a TOR proxy for anonymity.
- Checks for valid page loads and HTTPS certificates.
- Color-Coded Results:
- Green: Indicates the URL is safe.
- Red: Indicates the URL is unsafe or problematic.
==================================================
Phishing URL Checker (CLI Mode)
==================================================
Enter URLs to analyze (type 'done' to finish):
URL: http://example.com
http://example.com -> �[92mThis link is safe�[0m
URL: http://phishy-site.xyz
http://phishy-site.xyz -> �[91mTHIS LINK IS NOT SAFE�[0m
This project is licensed under the MIT License. See the LICENSE
file for details.
Contributions are welcome! Feel free to open issues or submit pull requests.
This tool is for educational purposes only. It is not a substitute for professional security software. Always exercise caution when interacting with unknown links.