qeeqbox / url-sandbox
Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks
☆169Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for url-sandbox
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆272Updated 7 months ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆162Updated last year
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆86Updated 2 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆63Updated last year
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆661Updated last year
- A Holistic OSINT and Threat Hunting Platform☆512Updated last year
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆78Updated 3 years ago
- Recent cyber attacks reports & interesting analysis files☆15Updated 2 years ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆493Updated this week
- Don't Just Search OSINT. Sweep It.☆309Updated 3 years ago
- Custom security distro for remote penetration testing☆51Updated 3 years ago
- A phishing kit collector for scavengers☆190Updated this week
- Exposing phishing kits seen from phishunt.io☆209Updated this week
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆167Updated 3 weeks ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆204Updated this week
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆111Updated 2 years ago
- Ransomware leak site monitoring☆308Updated 2 years ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆303Updated last year
- AIL framework - Analysis Information Leak framework☆609Updated this week
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆45Updated 3 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆24Updated 2 years ago
- Threat Intel Platform for T-POTs☆135Updated this week
- Repository for the LinkScope Client software.☆280Updated 3 months ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Updated last year
- Source code used at TweetFeed.live☆38Updated 2 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆695Updated last month
- Sublime rules for email attack detection, prevention, and threat hunting.☆256Updated this week
- - Crawler on tor network sites, searching for keywords.☆112Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆138Updated 3 years ago