qeeqbox / url-sandbox
Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks
☆182Updated 2 years ago
Alternatives and similar repositories for url-sandbox
Users that are interested in url-sandbox are comparing it to the libraries listed below
Sorting:
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆285Updated last year
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆92Updated 3 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆186Updated last year
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆70Updated last year
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆683Updated last year
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆321Updated 2 years ago
- Don't Just Search OSINT. Sweep It.☆315Updated 4 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆85Updated 4 months ago
- Custom security distro for remote penetration testing☆52Updated 4 years ago
- Recent cyber attacks reports & interesting analysis files☆15Updated 3 years ago
- A Holistic OSINT and Threat Hunting Platform☆524Updated 4 months ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆117Updated 3 years ago
- A phishing kit collector for scavengers☆205Updated last month
- Exposing phishing kits seen from phishunt.io☆241Updated last week
- Ransomware leak site monitoring☆312Updated 3 years ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆182Updated 3 weeks ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆215Updated this week
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆779Updated 3 months ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆86Updated 3 years ago
- A query aggregator for OSINT based threat hunting☆894Updated this week
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆558Updated this week
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 3 months ago
- Cybercrime forums for Cyber Threat Intelligence purpose☆81Updated 5 years ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆559Updated this week
- Extract and aggregate threat intelligence.☆863Updated last year
- Incident Response - Fast suspicious file finder☆242Updated 3 years ago
- A modular OSINT honeypot for blue teamers☆333Updated 2 years ago
- AIL framework - Analysis Information Leak framework☆727Updated this week
- Threat Intel Platform for T-POTs☆147Updated this week
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago