qeeqbox / url-sandboxLinks
Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks
☆182Updated 2 years ago
Alternatives and similar repositories for url-sandbox
Users that are interested in url-sandbox are comparing it to the libraries listed below
Sorting:
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆96Updated 3 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆198Updated 2 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆291Updated last year
- Ransomware leak site monitoring☆314Updated 3 years ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆339Updated 2 years ago
- Don't Just Search OSINT. Sweep It.☆316Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Updated last year
- CSI SIEM☆109Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- A phishing kit collector for scavengers☆218Updated last week
- Cyber Threat Intelligence Data, Indicators, and Analysis☆95Updated last month
- Incident Response - Fast suspicious file finder☆246Updated 3 years ago
- Cybercrime forums for Cyber Threat Intelligence purpose☆86Updated 5 years ago
- A Holistic OSINT and Threat Hunting Platform☆527Updated 7 months ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆227Updated this week
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆700Updated 2 years ago
- Threat Intel Platform for T-POTs☆161Updated this week
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- ☆149Updated 2 years ago
- an awesome list of active defense resources☆125Updated 5 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆120Updated 3 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆220Updated last year
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- OpenCTI Docker deployment helpers☆200Updated this week
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- Google Chrome forensic tool to process, analyze and visualize browsing artifacts☆121Updated 2 weeks ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 2 months ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆85Updated 4 years ago