Manual homograph & suspicious domain inspection toolkit with optional SOC-style intelligence enrichment.
PhishEye Recon is a browser extension designed to help security analysts, developers, and everyday users quickly analyze domains, URLs, and emails for phishing indicators. It focuses on visual deception (homograph attacks), brand impersonation, and risk scoring, with optional integrations for deeper threat intelligence.
- Detects homograph attacks (rn → m, vv → w, etc.)
- Identifies Unicode confusables (Cyrillic, Greek lookalikes)
- Flags punycode domains (
xn--) - Detects typosquatting & brand impersonation
- Checks:
- Suspicious keywords (login, verify, secure, etc.)
- Suspicious TLDs (.xyz, .ru, .tk, etc.)
- Long or deeply nested domains
- Score from 0–100
- Levels:
- LOW
- MEDIUM
- HIGH
- Clear explanation of findings for fast triage
- ASCII vs Unicode detection
- Punycode visibility
- Pattern hits
- Keyword hits
- Brand detection
- Input classification (URL, email, domain)
- VirusTotal enrichment
- urlscan.io integration
- Remote screenshot preview
- Threat context + detection summary
- SOC-style dashboard UI
-
Visual Analysis
Detects characters that visually mimic others -
Normalization Engine
Converts domains into comparable formats -
Brand Matching
Detects spoofed or near-match brands -
Heuristic Scoring
Combines multiple signals into a final risk score
- Download or clone this repository
- Open your browser and go to:
chrome://extensions/ - Enable Developer Mode
- Click Load unpacked
- Select the extension folder
- Click the PhishEye Recon icon
- Enter:
- Domain (
example.com) - URL (
https://example.com) - Email (
user@example.com)
- Domain (
- Click SCAN
- Use USE TAB to scan current page
- Enable SOC Mode for deeper analysis
- Add API key in settings
- Provides reputation and detection stats
- Add API key
- Enables:
- Remote scan
- Screenshot preview
- IP + infrastructure data
- Standard Mode → Fast, lightweight scanning
- SOC Mode → Full analyst dashboard
Includes:
- Risk badges
- Structured findings
- Expandable intel panels
├── manifest.json # Extension configuration
├── popup.html # UI layout
├── popup.css # Styling (SOC + standard)
├── popup.js # Detection engine + logic
└── icons/ # Extension iconsactiveTab→ Read current tab URLtabs→ Access tab infostorage→ Save settings
External APIs:
- VirusTotal
- urlscan.io
- No automatic browsing unless triggered
- urlscan runs in a remote sandbox
- API keys stored locally
- Built for analysis, not exploitation
- SOC analysts triaging phishing
- Blue team investigations
- Cybersecurity learners
- Developers validating domains
- Everyday users checking suspicious links
- Full-page screenshot stitching
- Passive scanning (no open tab)
- Export reports (PDF / JSON)
- More threat intel integrations
- Context menu scanning
Aaron Zajicek
Cybersecurity & Automation Builder
If you find this useful:
- Star the repo
- Share it
- Contribute ideas
Expose what hides in plain sight.