Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
☆228Aug 8, 2023Updated 2 years ago
Alternatives and similar repositories for raven
Users that are interested in raven are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆105Apr 26, 2022Updated 3 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆109Jul 11, 2021Updated 4 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆313Apr 15, 2024Updated 2 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆48Apr 26, 2021Updated 4 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆34Apr 15, 2022Updated 4 years ago
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 5 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆129Nov 22, 2021Updated 4 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆830Aug 8, 2023Updated 2 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆961Dec 3, 2025Updated 4 months ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- ☆100Nov 10, 2021Updated 4 years ago
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Sep 7, 2023Updated 2 years ago
- CSI SIEM☆109Dec 8, 2022Updated 3 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 3 years ago
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- Attack Surface Discovery tool built on a microservice approach, utilizing multi-threading for fast, internet-scale asset indexing☆255Dec 12, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Yet another content discovery tool☆119Nov 16, 2024Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 4 years ago
- TIGMINT: OSINT (Open Source Intelligence) GUI software framework☆255Jul 29, 2021Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Sep 21, 2025Updated 6 months ago
- First iteration of ML based Feedback WAF☆59Mar 20, 2024Updated 2 years ago
- A Holistic OSINT and Threat Hunting Platform☆531Jan 2, 2025Updated last year
- ☆25Feb 18, 2025Updated last year
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Search-Scan-Save-Notify☆11May 12, 2025Updated 11 months ago
- firedrill is a malware simulation harness for evaluating your security controls☆199Jan 26, 2024Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- A query aggregator for OSINT based threat hunting☆936Mar 7, 2026Updated last month
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 11 months ago
- An online handy-recon tool☆259Nov 12, 2023Updated 2 years ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆659May 4, 2023Updated 2 years ago