DNStwist
Performs DNS fuzzing to detect typosquatting, phishing, and corporate espionage by analyzing domain permutations.
About
This Model Context Protocol (MCP) server provides powerful tools for DNS fuzzing, helping users identify potentially malicious domains through comprehensive analysis of domain permutations. It is designed to seamlessly integrate with MCP-compatible applications like Claude Desktop, enabling the detection of typosquatting, phishing, and corporate espionage, and providing insights into DNS records, WHOIS data, and web presence.
Key Features
- Domain Fuzzing: Generate domain permutations using various algorithms
- Phishing Detection: Generate fuzzy hashes of web pages to identify lookalikes
- DNS Analysis: Check A, AAAA, MX, and NS records for fuzzed domains
- WHOIS Data Retrieval: Access registration dates and registrar information
- Configurable Scans: Customize DNS servers, parallel processing, and output formats
- 0 GitHub stars
Use Cases
- Detecting typosquatting attacks and brand impersonation
- Identifying potential phishing attempts targeting an organization
- Conducting security research on domain permutations and threats