qeeqbox / raven
Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
☆186Updated last year
Alternatives and similar repositories for raven
Users that are interested in raven are comparing it to the libraries listed below
Sorting:
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆92Updated 3 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆182Updated 2 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆285Updated last year
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆683Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆130Updated 5 months ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆779Updated 3 months ago
- A Holistic OSINT and Threat Hunting Platform☆524Updated 4 months ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆123Updated 2 years ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆321Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆110Updated this week
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 3 months ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆215Updated this week
- Threat-Intelligence Feeds & Tools & Frameworks☆215Updated 11 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆85Updated 4 months ago
- - Crawler on tor network sites, searching for keywords.☆135Updated last year
- A modular OSINT honeypot for blue teamers☆333Updated 2 years ago
- Exposing phishing kits seen from phishunt.io☆241Updated last week
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 2 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆50Updated 3 months ago
- Tool to discover external and internal network attack surface☆197Updated 11 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆252Updated 2 years ago
- 🏴☠️💰 Another Ransomware gang tracker☆197Updated this week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆385Updated 3 months ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆70Updated last year
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆259Updated last year
- An awesome list of resources on deception-based security with honeypots and honeytokens☆173Updated 4 months ago
- Incident Response - Fast suspicious file finder☆242Updated 3 years ago
- An forensics tool to help aid in the investigation of spoofed emails based off the email headers.☆165Updated 3 years ago