qeeqbox / url-sandboxLinks
Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks
☆183Updated 2 years ago
Alternatives and similar repositories for url-sandbox
Users that are interested in url-sandbox are comparing it to the libraries listed below
Sorting:
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆287Updated last year
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆193Updated last year
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆94Updated 3 years ago
- Ransomware leak site monitoring☆313Updated 3 years ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆335Updated 2 years ago
- Exposing phishing kits seen from phishunt.io☆248Updated last month
- Repository of Yara rules dedicated to Phishing Kits Zip files☆226Updated last month
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆71Updated last year
- A Holistic OSINT and Threat Hunting Platform☆525Updated 6 months ago
- A phishing kit collector for scavengers☆216Updated last month
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆697Updated last year
- Don't Just Search OSINT. Sweep It.☆315Updated 4 years ago
- ☆148Updated 2 years ago
- Threat Intel Platform for T-POTs☆156Updated last week
- a curated, categorised collection of useful projects 👨👩👧☆113Updated 2 weeks ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- Google Chrome forensic tool to process, analyze and visualize browsing artifacts☆121Updated last month
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆83Updated 4 years ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆188Updated 2 months ago
- CSI SIEM☆110Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆143Updated last year
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆92Updated 4 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆91Updated last month
- Recent cyber attacks reports & interesting analysis files☆15Updated 3 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆118Updated 3 years ago
- Incident Response - Fast suspicious file finder☆242Updated 3 years ago
- Custom security distro for remote penetration testing☆53Updated 4 years ago
- URL fingerprinting made easy☆87Updated last year
- Visualize networks of phishing by querying the phishstats.info API☆79Updated 11 months ago