Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)
β316Apr 15, 2024Updated 2 years ago
Alternatives and similar repositories for analyzer
Users that are interested in analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacksβ197Oct 30, 2022Updated 3 years ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β105Apr 26, 2022Updated 4 years ago
- Recent cyber attacks reports & interesting analysis filesβ15Apr 14, 2022Updated 4 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPSβ¦β830Aug 8, 2023Updated 2 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviorsβ74Nov 12, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Custom security distro for remote penetration testingβ56Mar 26, 2021Updated 5 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Webβ130Nov 22, 2021Updated 4 years ago
- A collection of attacks metadata that were used in my previous pen-test toolsβ17Dec 23, 2022Updated 3 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)β229Aug 8, 2023Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)β48Apr 26, 2021Updated 5 years ago
- β14Dec 28, 2020Updated 5 years ago
- Pure Honeypots with an automated bash scriptβ21Sep 9, 2021Updated 4 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, msβ¦β964Dec 3, 2025Updated 4 months ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) witβ¦β110Jul 11, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)β34Apr 15, 2022Updated 4 years ago
- Collection of exploits that were verified by an automated systemβ13Jun 17, 2021Updated 4 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, anβ¦β13Feb 18, 2024Updated 2 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malwareβ14Mar 4, 2020Updated 6 years ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ22,705Jan 12, 2026Updated 3 months ago
- An interactive world-map that has been used in live Cyber Threat interfacesβ13Jul 31, 2021Updated 4 years ago
- Extract and aggregate threat intelligence.β911Jan 31, 2024Updated 2 years ago
- ssdeep cluster analysis for malware filesβ31Jun 5, 2020Updated 5 years ago
- A collection of cyberchef recipes for use in osint investigationsβ14Jul 2, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Repository of Yara rules created by the Stratosphere teamβ29Jul 8, 2021Updated 4 years ago
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacksβ10Jan 29, 2024Updated 2 years ago
- Community-based integrated malware identification systemβ81Dec 10, 2022Updated 3 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonatiβ¦β954Updated this week
- Scanning pastebin with yara rulesβ1,133Jan 10, 2026Updated 3 months ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.β21Mar 12, 2019Updated 7 years ago
- HoneyDB Python Moduleβ14Feb 6, 2024Updated 2 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)β103Mar 21, 2026Updated last month
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABSβ82Dec 24, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- IOC from articles, tweets for archivesβ318Dec 12, 2023Updated 2 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own researchβ266Feb 7, 2019Updated 7 years ago
- Repository for scripts and tips for "Yara Scan Service"β20Feb 19, 2023Updated 3 years ago
- Tool to predict attacker groups from the techniques and software usedβ49Aug 4, 2021Updated 4 years ago
- Defanged Indicator of Compromise (IOC) Extractor.β576Aug 28, 2024Updated last year
- wifi attacks suiteβ59Sep 24, 2020Updated 5 years ago
- Collection of YARA signatures from individual researchβ44Nov 20, 2023Updated 2 years ago