An automated phishing email analysis tool that extracts observables, integrates with TheHive/Cortex/MISP, and calculates verdicts.
ThePhish is an automated phishing email analysis tool that processes suspicious emails forwarded by users. It extracts observables like URLs and domains, analyzes them using integrated security platforms (TheHive, Cortex, MISP), and provides a verdict to help security teams respond quickly. It automates the tedious parts of phishing investigation, reducing manual effort.
Security analysts, SOC teams, and IT security professionals who need to process and analyze phishing emails at scale. It's ideal for organizations using or willing to deploy TheHive, Cortex, and MISP in their security operations.
Developers choose ThePhish because it provides a complete, open-source automation pipeline for phishing analysis, integrates seamlessly with popular security tools, and offers a user-friendly web interface. It reduces analysis time and ensures consistent processes compared to manual methods.
ThePhish: an automated phishing email analysis tool
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Automatically extracts observables from emails, submits them to Cortex analyzers, and calculates a verdict, streamlining the entire phishing analysis workflow as shown in the detailed implementation diagram.
Seamlessly creates cases in TheHive, leverages Cortex for analysis, and exports findings to MISP, fitting directly into existing SOC pipelines without extra steps.
Supports exact matching and regex for various observable types, including domains in subdomains and URLs, allowing precise control over false positive reduction as demonstrated in the whitelist.json example.
Provides real-time progress updates via WebSocket and allows analysts to intervene for inconclusive cases, balancing automation with oversight through the GUI shown in the demo screenshots.
Requires operational instances of TheHive, Cortex, MISP, and an IMAP email service, making the system brittle if any component fails or isn't properly configured.
Many Cortex analyzers need API keys, subscriptions, or have bugs requiring manual level adjustments in ThePhish's configuration files, as admitted in the 'Configure the analyzers' section.
Users must manually add the run_responder function to TheHive4py, as stated in the installation guide, which is error-prone and may break with updates to dependencies.