qeeqbox / url-sandboxView external linksLinks
Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks
☆192Oct 30, 2022Updated 3 years ago
Alternatives and similar repositories for url-sandbox
Users that are interested in url-sandbox are comparing it to the libraries listed below
Sorting:
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆308Apr 15, 2024Updated last year
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Apr 26, 2021Updated 4 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆126Nov 22, 2021Updated 4 years ago
- Custom security distro for remote penetration testing☆55Mar 26, 2021Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Nov 12, 2023Updated 2 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆105Jul 11, 2021Updated 4 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆826Aug 8, 2023Updated 2 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆33Apr 15, 2022Updated 3 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆941Dec 3, 2025Updated 2 months ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆212Aug 8, 2023Updated 2 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- ☆10Apr 10, 2024Updated last year
- 🗞 Monitors data sources, alerts you when they change☆13Jul 23, 2021Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- A collection of infosec related scripts and information.☆53Oct 2, 2024Updated last year
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 5 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- Crawler that retrieves commoncrawl's crawled hosts and their corresponding IPs☆21Sep 1, 2025Updated 5 months ago
- ☆28Feb 7, 2021Updated 5 years ago
- Threat Intel Platform for T-POTs☆167Updated this week
- Single-threaded epoll-based concurrent bulk whois client☆31Oct 31, 2017Updated 8 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last week
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆86Jan 11, 2024Updated 2 years ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆21,069Jan 12, 2026Updated last month
- Blocker Hacks☆14Apr 8, 2022Updated 3 years ago
- Collection of useful Canary tools☆93Jan 29, 2026Updated 2 weeks ago
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago