Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
☆768May 1, 2026Updated this week
Alternatives and similar repositories for lookyloo
Users that are interested in lookyloo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- FAME Automates Malware Evaluation☆939Updated this week
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆280Apr 21, 2026Updated 2 weeks ago
- Your Everyday Threat Intelligence☆1,977Apr 14, 2026Updated 3 weeks ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,370Apr 29, 2026Updated last week
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,114Apr 28, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Passive SSH back-end and scanner.☆105Jun 18, 2025Updated 10 months ago
- An open source platform to support analysts to organise their case and tasks☆134Apr 30, 2026Updated last week
- A query aggregator for OSINT based threat hunting☆938Mar 7, 2026Updated 2 months ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆70Nov 11, 2023Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆130Sep 24, 2023Updated 2 years ago
- Python script to decode common encoded PowerShell scripts☆216Jun 13, 2018Updated 7 years ago
- Incident Response Methodologies☆1,016Aug 2, 2018Updated 7 years ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- Collaborative forensic timeline analysis☆3,321Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆24Sep 28, 2022Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Application☆534Jan 13, 2026Updated 3 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,544Jan 12, 2026Updated 3 months ago
- Actionable analytics designed to combat threats☆1,009May 25, 2022Updated 3 years ago
- Extract and Visualize Data from URLs using Unfurl☆738Apr 19, 2026Updated 2 weeks ago
- Website crawler with YARA detection☆90Aug 20, 2023Updated 2 years ago
- AIL framework - Analysis Information Leak framework☆939Apr 29, 2026Updated last week
- Collaborative Incident Response platform☆1,481Apr 28, 2026Updated last week
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,954Jul 6, 2024Updated last year
- Extract and aggregate threat intelligence.☆913Jan 31, 2024Updated 2 years ago
- Re-play Security Events☆1,746Mar 20, 2024Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,286Apr 29, 2026Updated last week
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆92Apr 7, 2026Updated 3 weeks ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,768Apr 16, 2026Updated 2 weeks ago
- Fast Incident Response☆2,007Apr 30, 2026Updated last week
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆50Apr 11, 2026Updated 3 weeks ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Online hash checker for Virustotal and other services☆848Mar 21, 2025Updated last year
- A list of cyber-chef recipes and curated links☆2,202Jun 14, 2024Updated last year
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,345Dec 13, 2022Updated 3 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,171Apr 22, 2026Updated 2 weeks ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,070Oct 5, 2023Updated 2 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated 2 months ago