qeeqbox / raven
Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
β183Updated last year
Alternatives and similar repositories for raven:
Users that are interested in raven are comparing it to the libraries listed below
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacksβ178Updated 2 years ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β91Updated 2 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOSβ¦β283Updated 11 months ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPSβ¦β676Updated last year
- A Holistic OSINT and Threat Hunting Platformβ523Updated 2 months ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, msβ¦β765Updated 2 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.β350Updated 2 months ago
- Shodan Monitoring integration for TheHive.β130Updated 3 months ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.β221Updated 3 years ago
- Incident Response - Fast suspicious file finderβ240Updated 2 years ago
- Exposing phishing kits seen from phishunt.ioβ234Updated 2 weeks ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearchβ319Updated 2 years ago
- Docker configurations for TheHive, Cortex and 3rd party toolsβ119Updated 2 years ago
- π΄ββ οΈπ° Another Ransomware gang trackerβ186Updated this week
- Cyber Threat Intelligence Data, Indicators, and Analysisβ84Updated 3 months ago
- Repository of Yara rules dedicated to Phishing Kits Zip filesβ213Updated last week
- A modular OSINT honeypot for blue teamersβ333Updated last year
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can geneβ¦β251Updated last year
- An forensics tool to help aid in the investigation of spoofed emails based off the email headers.β162Updated 3 years ago
- Ransomware leak site monitoringβ311Updated 3 years ago
- β52Updated this week
- - Crawler on tor network sites, searching for keywords.β131Updated last year
- Yet another Ransomware gang trackerβ402Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessionsβ553Updated 3 weeks ago
- β141Updated last year
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) witβ¦β85Updated 3 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scrapingβ48Updated 2 months ago
- Building a consolidated RSS feed for articles about cyberattacksβ67Updated this week
- A collection of intelligence about Log4Shell and its exploitation activity.β183Updated 3 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports fβ¦β141Updated 2 years ago