qeeqbox / url-sandbox
Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks
β176Updated 2 years ago
Alternatives and similar repositories for url-sandbox:
Users that are interested in url-sandbox are comparing it to the libraries listed below
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOSβ¦β277Updated 9 months ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β91Updated 2 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)β168Updated last year
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviorsβ65Updated last year
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPSβ¦β670Updated last year
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) witβ¦β83Updated 3 years ago
- Custom security distro for remote penetration testingβ52Updated 3 years ago
- Don't Just Search OSINT. Sweep It.β311Updated 3 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Webβ112Updated 3 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip filesβ207Updated last week
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domainsβ¦β513Updated this week
- Recent cyber attacks reports & interesting analysis filesβ15Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)β45Updated 3 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, msβ¦β722Updated 2 weeks ago
- Incident Response - Fast suspicious file finderβ237Updated 2 years ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearchβ310Updated 2 years ago
- A phishing kit collector for scavengersβ196Updated this week
- Ransomware leak site monitoringβ309Updated 2 years ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tacticsβ168Updated 2 months ago
- Threat Intel Platform for T-POTsβ138Updated this week
- A Holistic OSINT and Threat Hunting Platformβ517Updated 3 weeks ago
- Cyber Threat Intelligence Data, Indicators, and Analysisβ81Updated last month
- A basic phishing kit scanner for dedicated and semi-dedicated hostingβ107Updated 2 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. β¦β75Updated 4 years ago
- DFIRTrack - The Incident Response Tracking Applicationβ487Updated 4 months ago
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.β67Updated this week
- Sublime rules for email attack detection, prevention, and threat hunting.β269Updated this week
- Exposing phishing kits seen from phishunt.ioβ220Updated last week
- π§ The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux systemβ275Updated 3 months ago