qeeqbox / url-sandbox
Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks
β178Updated 2 years ago
Alternatives and similar repositories for url-sandbox:
Users that are interested in url-sandbox are comparing it to the libraries listed below
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOSβ¦β283Updated 11 months ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β91Updated 2 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)β183Updated last year
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPSβ¦β676Updated last year
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviorsβ67Updated last year
- Custom security distro for remote penetration testingβ52Updated 4 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, msβ¦β765Updated 2 months ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) witβ¦β85Updated 3 years ago
- Recent cyber attacks reports & interesting analysis filesβ15Updated 2 years ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tacticsβ176Updated last week
- Kali and Parrot OS docker images accessible via VNC, RDP and Webβ114Updated 3 years ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearchβ319Updated 2 years ago
- Don't Just Search OSINT. Sweep It.β313Updated 4 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysisβ84Updated 3 months ago
- A Holistic OSINT and Threat Hunting Platformβ523Updated 2 months ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)β45Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agenciesβ85Updated 2 years ago
- Threat Intel Platform for T-POTsβ144Updated last week
- Repository of Yara rules dedicated to Phishing Kits Zip filesβ213Updated last week
- Exposing phishing kits seen from phishunt.ioβ234Updated 2 weeks ago
- Welcome to the SEKOIA.IO Community repository!β143Updated last week
- Sublime rules for email attack detection, prevention, and threat hunting.β283Updated this week
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domainsβ¦β533Updated this week
- Ransomware leak site monitoringβ311Updated 3 years ago
- Incident Response - Fast suspicious file finderβ240Updated 2 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hostingβ108Updated 2 years ago
- URL fingerprinting made easyβ86Updated 11 months ago
- π΄ββ οΈπ° Another Ransomware gang trackerβ186Updated this week
- A phishing kit collector for scavengersβ199Updated 2 months ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.β638Updated last year