ZeroPhish is a tool designed to help users identify potential phishing attempts in emails by analyzing email content and scanning URLs for malicious indicators.
- Email content analysis for phishing indicators
- URL scanning using VirusTotal API
- Detection of suspicious phrases and urgency indicators
- User-friendly interface with detailed scan results
The project consists of two main components:
-
Backend (Flask API)
- Handles email content analysis
- Performs URL scanning via VirusTotal API
- Provides assessment of phishing risk
-
Frontend (React)
- User interface for submitting emails for scanning
- Displays detailed scan results
- Works both as a web application and browser extension
-
Navigate to the backend directory:
cd backend
-
Install the required dependencies:
pip install -r requirements.txt
-
Create a
.env
file in the backend directory with your VirusTotal API key:VT_API=your_virustotal_api_key_here
-
Start the backend server:
python main.py
The server will run on http://localhost:5000
-
Navigate to the frontend directory:
cd frontend/ZeroPhish
-
Install the required dependencies:
npm install
-
Start the development server:
npm run dev
The application will be available at http://localhost:5173
- Start both the backend and frontend servers as described above.
- Open the web application in your browser.
- Paste the email content you want to analyze into the text area.
- Click the "SCAN" button to analyze the email.
- Review the detailed results, including:
- Overall safety assessment
- Detected suspicious phrases
- Urgency indicators
- URL scan results
The application can also function as a browser extension that can extract email content directly from webmail interfaces. This functionality requires additional setup and browser extension packaging.
This project is licensed under the MIT License - see the LICENSE file for details.