qeeqbox / ravenLinks
Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
β209Updated 2 years ago
Alternatives and similar repositories for raven
Users that are interested in raven are comparing it to the libraries listed below
Sorting:
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacksβ190Updated 3 years ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β104Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysisβ104Updated last month
- A Holistic OSINT and Threat Hunting Platformβ528Updated 11 months ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOSβ¦β307Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.β219Updated 3 years ago
- CSI SIEMβ110Updated 3 years ago
- This project is a SIEM with SIRP and Threat Intel, all in one.β464Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains β¦β123Updated last week
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can geneβ¦β280Updated 2 years ago
- Ransomware leak site monitoringβ315Updated 3 years ago
- a curated, categorised collection of useful projects π¨βπ©βπ§ββ122Updated 2 weeks ago
- Docker configurations for TheHive, Cortex and 3rd party toolsβ128Updated 2 years ago
- Threat Intel Platform for T-POTsβ160Updated this week
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearchβ345Updated 3 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip filesβ234Updated last week
- π΄ββ οΈπ° Another Ransomware gang trackerβ271Updated 3 months ago
- Shodan Monitoring integration for TheHive.β131Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.β412Updated 7 months ago
- A modular OSINT honeypot for blue teamersβ341Updated 2 years ago
- Incident Response - Fast suspicious file finderβ247Updated last week
- Building a consolidated RSS feed for articles about cyberattacksβ72Updated this week
- Threat-Intelligence Feeds & Tools & Frameworksβ222Updated last year
- - Crawler on tor network sites, searching for keywords.β160Updated 2 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISPβ49Updated 6 months ago
- Exposing phishing kits seen from phishunt.ioβ260Updated 6 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.β58Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatioβ¦β141Updated 10 months ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. β¦β87Updated 5 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPSβ¦β713Updated 2 years ago