qeeqbox / ravenLinks
Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
β210Updated 2 years ago
Alternatives and similar repositories for raven
Users that are interested in raven are comparing it to the libraries listed below
Sorting:
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacksβ191Updated 3 years ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β102Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysisβ107Updated last week
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.β262Updated 3 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip filesβ236Updated 2 weeks ago
- Exposing phishing kits seen from phishunt.ioβ263Updated 7 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains β¦β127Updated this week
- A Holistic OSINT and Threat Hunting Platformβ529Updated last year
- CSI SIEMβ109Updated 3 years ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can geneβ¦β286Updated 2 years ago
- Threat Intel Platform for T-POTsβ162Updated this week
- Ransomware leak site monitoringβ315Updated 3 years ago
- π΄ββ οΈπ° Another Ransomware gang trackerβ285Updated 2 weeks ago
- Threat-Intelligence Feeds & Tools & Frameworksβ222Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISPβ50Updated 7 months ago
- Shodan Monitoring integration for TheHive.β130Updated last year
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOSβ¦β308Updated last year
- This project is a SIEM with SIRP and Threat Intel, all in one.β460Updated last year
- Incident Response - Fast suspicious file finderβ248Updated last week
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearchβ347Updated 3 years ago
- Docker configurations for TheHive, Cortex and 3rd party toolsβ128Updated 3 years ago
- A phishing kit collector for scavengersβ220Updated last week
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionβ¦β115Updated 4 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β69Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatioβ¦β140Updated 11 months ago
- A modular OSINT honeypot for blue teamersβ340Updated 2 years ago
- Building a consolidated RSS feed for articles about cyberattacksβ73Updated this week
- URL fingerprinting made easyβ90Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.β415Updated 8 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scrapingβ63Updated 3 months ago