Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)
β312Apr 15, 2024Updated last year
Alternatives and similar repositories for analyzer
Users that are interested in analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacksβ196Oct 30, 2022Updated 3 years ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β105Apr 26, 2022Updated 3 years ago
- Recent cyber attacks reports & interesting analysis filesβ15Apr 14, 2022Updated 3 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPSβ¦β828Aug 8, 2023Updated 2 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviorsβ74Nov 12, 2023Updated 2 years ago
- Custom security distro for remote penetration testingβ56Mar 26, 2021Updated 4 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Webβ129Nov 22, 2021Updated 4 years ago
- A collection of attacks metadata that were used in my previous pen-test toolsβ17Dec 23, 2022Updated 3 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)β226Aug 8, 2023Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)β48Apr 26, 2021Updated 4 years ago
- β14Dec 28, 2020Updated 5 years ago
- Pure Honeypots with an automated bash scriptβ21Sep 9, 2021Updated 4 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, msβ¦β957Dec 3, 2025Updated 3 months ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) witβ¦β110Jul 11, 2021Updated 4 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)β34Apr 15, 2022Updated 3 years ago
- Collection of exploits that were verified by an automated systemβ13Jun 17, 2021Updated 4 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, anβ¦β13Feb 18, 2024Updated 2 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malwareβ14Mar 4, 2020Updated 6 years ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ22,186Jan 12, 2026Updated 2 months ago
- An interactive world-map that has been used in live Cyber Threat interfacesβ13Jul 31, 2021Updated 4 years ago
- Extract and aggregate threat intelligence.β907Jan 31, 2024Updated 2 years ago
- ssdeep cluster analysis for malware filesβ31Jun 5, 2020Updated 5 years ago
- A collection of cyberchef recipes for use in osint investigationsβ14Jul 2, 2022Updated 3 years ago
- Repository of Yara rules created by the Stratosphere teamβ29Jul 8, 2021Updated 4 years ago
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacksβ11Jan 29, 2024Updated 2 years ago
- Community-based integrated malware identification systemβ81Dec 10, 2022Updated 3 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonatiβ¦β942Mar 13, 2026Updated last week
- Scanning pastebin with yara rulesβ1,129Jan 10, 2026Updated 2 months ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.β21Mar 12, 2019Updated 7 years ago
- HoneyDB Python Moduleβ14Feb 6, 2024Updated 2 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABSβ82Dec 24, 2020Updated 5 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)β103Updated this week
- IOC from articles, tweets for archivesβ318Dec 12, 2023Updated 2 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own researchβ266Feb 7, 2019Updated 7 years ago
- Repository for scripts and tips for "Yara Scan Service"β20Feb 19, 2023Updated 3 years ago
- Tool to predict attacker groups from the techniques and software usedβ49Aug 4, 2021Updated 4 years ago
- Defanged Indicator of Compromise (IOC) Extractor.β571Aug 28, 2024Updated last year
- wifi attacks suiteβ59Sep 24, 2020Updated 5 years ago
- Collection of YARA signatures from individual researchβ44Nov 20, 2023Updated 2 years ago