qeeqbox / raven
Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
β183Updated last year
Alternatives and similar repositories for raven:
Users that are interested in raven are comparing it to the libraries listed below
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacksβ178Updated 2 years ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β91Updated 2 years ago
- Shodan Monitoring integration for TheHive.β130Updated 2 months ago
- Wazuh integration TheHiveβ34Updated 2 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOSβ¦β280Updated 10 months ago
- Signature based honeypot detector tool written in Golangβ89Updated 2 months ago
- Docker configurations for TheHive, Cortex and 3rd party toolsβ117Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threatsβ162Updated last year
- Threat Intel Platform for T-POTsβ141Updated this week
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.β220Updated 2 years ago
- MISP Playbooksβ184Updated last week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.β348Updated 3 weeks ago
- β49Updated this week
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.β88Updated 10 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatioβ¦β139Updated last week
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!β60Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scrapingβ48Updated 3 weeks ago
- Yet another Ransomware gang trackerβ377Updated this week
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains β¦β105Updated this week
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports fβ¦β141Updated 2 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, msβ¦β749Updated 3 weeks ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detectionsβ177Updated 2 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.β131Updated last year
- CLI tools for forensic investigation of Windows artifactsβ325Updated 3 months ago
- π΄ββ οΈπ° Another Ransomware gang trackerβ177Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β242Updated this week
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can geneβ¦β248Updated last year
- Threat Hunting tool about Sysmon and graphsβ330Updated last year
- Building a consolidated RSS feed for articles about cyberattacksβ65Updated this week