Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)
β313Apr 15, 2024Updated last year
Alternatives and similar repositories for analyzer
Users that are interested in analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacksβ197Oct 30, 2022Updated 3 years ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β105Apr 26, 2022Updated 3 years ago
- Recent cyber attacks reports & interesting analysis filesβ15Apr 14, 2022Updated 3 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPSβ¦β829Aug 8, 2023Updated 2 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviorsβ74Nov 12, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Custom security distro for remote penetration testingβ56Mar 26, 2021Updated 5 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Webβ129Nov 22, 2021Updated 4 years ago
- A collection of attacks metadata that were used in my previous pen-test toolsβ17Dec 23, 2022Updated 3 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)β227Aug 8, 2023Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)β48Apr 26, 2021Updated 4 years ago
- β14Dec 28, 2020Updated 5 years ago
- Pure Honeypots with an automated bash scriptβ21Sep 9, 2021Updated 4 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, msβ¦β960Dec 3, 2025Updated 4 months ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) witβ¦β110Jul 11, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)β34Apr 15, 2022Updated 3 years ago
- Collection of exploits that were verified by an automated systemβ13Jun 17, 2021Updated 4 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, anβ¦β13Feb 18, 2024Updated 2 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malwareβ14Mar 4, 2020Updated 6 years ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ22,543Jan 12, 2026Updated 3 months ago
- Extract and aggregate threat intelligence.β909Jan 31, 2024Updated 2 years ago
- ssdeep cluster analysis for malware filesβ31Jun 5, 2020Updated 5 years ago
- A collection of cyberchef recipes for use in osint investigationsβ14Jul 2, 2022Updated 3 years ago
- Repository of Yara rules created by the Stratosphere teamβ29Jul 8, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacksβ11Jan 29, 2024Updated 2 years ago
- Community-based integrated malware identification systemβ81Dec 10, 2022Updated 3 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonatiβ¦β945Updated this week
- Scanning pastebin with yara rulesβ1,131Jan 10, 2026Updated 3 months ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.β21Mar 12, 2019Updated 7 years ago
- HoneyDB Python Moduleβ14Feb 6, 2024Updated 2 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABSβ82Dec 24, 2020Updated 5 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)β103Mar 21, 2026Updated 3 weeks ago
- IOC from articles, tweets for archivesβ318Dec 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Personal compilation of APT malware from whitepaper releases, documents and own researchβ265Feb 7, 2019Updated 7 years ago
- Repository for scripts and tips for "Yara Scan Service"β20Feb 19, 2023Updated 3 years ago
- Tool to predict attacker groups from the techniques and software usedβ49Aug 4, 2021Updated 4 years ago
- Defanged Indicator of Compromise (IOC) Extractor.β574Aug 28, 2024Updated last year
- wifi attacks suiteβ59Sep 24, 2020Updated 5 years ago
- Collection of YARA signatures from individual researchβ44Nov 20, 2023Updated 2 years ago
- Collection of scripts for different malware analysis tasksβ76Jul 15, 2019Updated 6 years ago