Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks
☆197Oct 30, 2022Updated 3 years ago
Alternatives and similar repositories for url-sandbox
Users that are interested in url-sandbox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆316Apr 15, 2024Updated 2 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆130Nov 22, 2021Updated 4 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆105Apr 26, 2022Updated 4 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 4 years ago
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆832Aug 8, 2023Updated 2 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆111Jul 11, 2021Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆965Dec 3, 2025Updated 5 months ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆34Apr 15, 2022Updated 4 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆229Aug 8, 2023Updated 2 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆26Jan 29, 2024Updated 2 years ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆22,747Jan 12, 2026Updated 3 months ago
- 🗞 Monitors data sources, alerts you when they change☆13Jul 23, 2021Updated 4 years ago
- ☆28Feb 7, 2021Updated 5 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Threat Intel Platform for T-POTs☆198Apr 28, 2026Updated last week
- Collection of walkthroughs on various threat hunting techniques☆77Aug 3, 2020Updated 5 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Sep 29, 2025Updated 7 months ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆11Mar 5, 2018Updated 8 years ago
- A open source ransomware.☆11Apr 8, 2017Updated 9 years ago
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- A collection of infosec related scripts and information.☆54Oct 2, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆17Mar 13, 2026Updated last month
- Search-Scan-Save-Notify☆11May 12, 2025Updated 11 months ago
- Single-threaded epoll-based concurrent bulk whois client☆31Oct 31, 2017Updated 8 years ago
- Crawler that retrieves commoncrawl's crawled hosts and their corresponding IPs☆21Sep 1, 2025Updated 8 months ago
- IntelOwl: manage your Threat Intelligence at scale☆4,562Updated this week
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆143Apr 20, 2023Updated 3 years ago