qeeqbox / url-sandbox
Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks
β178Updated 2 years ago
Alternatives and similar repositories for url-sandbox:
Users that are interested in url-sandbox are comparing it to the libraries listed below
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOSβ¦β280Updated 10 months ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β91Updated 2 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)β183Updated last year
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviorsβ67Updated last year
- Recent cyber attacks reports & interesting analysis filesβ15Updated 2 years ago
- Custom security distro for remote penetration testingβ52Updated 3 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) witβ¦β85Updated 3 years ago
- Don't Just Search OSINT. Sweep It.β312Updated 4 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPSβ¦β674Updated last year
- Kali and Parrot OS docker images accessible via VNC, RDP and Webβ114Updated 3 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, msβ¦β749Updated 3 weeks ago
- Threat Intel Platform for T-POTsβ141Updated this week
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)β45Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysisβ83Updated 2 months ago
- Exposing phishing kits seen from phishunt.ioβ223Updated this week
- Repository of Yara rules dedicated to Phishing Kits Zip filesβ210Updated 2 weeks ago
- Further investigation in to APT campaigns disclosed by private security firms and security agenciesβ85Updated 2 years ago
- Useful for digital forensics investigations or initial black-box pentest footprinting.β136Updated 3 years ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.β635Updated 11 months ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearchβ311Updated 2 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)β25Updated 2 years ago
- Docker configurations for TheHive, Cortex and 3rd party toolsβ117Updated 2 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.β173Updated 8 months ago
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...β29Updated 5 years ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domainsβ¦β523Updated this week
- Open Source Platform for storing, organizing, and searching documents related to cyber threatsβ162Updated last year
- β139Updated last year
- Visualize networks of phishing by querying the phishstats.info APIβ78Updated 6 months ago
- Ransomware leak site monitoringβ311Updated 2 years ago
- Threat-Intelligence Feeds & Tools & Frameworksβ216Updated 8 months ago