qeeqbox / ravenLinks
Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
β200Updated 2 years ago
Alternatives and similar repositories for raven
Users that are interested in raven are comparing it to the libraries listed below
Sorting:
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacksβ182Updated 2 years ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β98Updated 3 years ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can geneβ¦β276Updated last year
- Exposing phishing kits seen from phishunt.ioβ256Updated 3 months ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.β219Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysisβ97Updated 2 months ago
- π΄ββ οΈπ° Another Ransomware gang trackerβ261Updated last month
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOSβ¦β290Updated last year
- Threat Intel Platform for T-POTsβ159Updated this week
- CSI SIEMβ110Updated 2 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip filesβ231Updated 3 weeks ago
- Shodan Monitoring integration for TheHive.β131Updated 10 months ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearchβ340Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains β¦β120Updated this week
- On demand query API for https://github.com/davidonzo/Threat-Intel project.β57Updated last year
- a curated, categorised collection of useful projects π¨βπ©βπ§ββ121Updated last week
- A Holistic OSINT and Threat Hunting Platformβ527Updated 9 months ago
- Ransomware leak site monitoringβ316Updated 3 years ago
- β146Updated 2 years ago
- β134Updated 2 years ago
- Ransomware groups postsβ42Updated this week
- Sniffing out well-known threat groupsβ61Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.β404Updated 4 months ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalakeβ175Updated 2 years ago
- Building a consolidated RSS feed for articles about cyberattacksβ72Updated this week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β68Updated last year
- Dictionary of CTI-related acronyms, terms, and jargonβ144Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!β64Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatioβ¦β141Updated 7 months ago
- StalkPhish-OSS - The Phishing kits stalker, harvesting phishing kits for investigations.β67Updated 3 months ago