Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks
☆193Oct 30, 2022Updated 3 years ago
Alternatives and similar repositories for url-sandbox
Users that are interested in url-sandbox are comparing it to the libraries listed below
Sorting:
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆310Apr 15, 2024Updated last year
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆127Nov 22, 2021Updated 4 years ago
- Custom security distro for remote penetration testing☆55Mar 26, 2021Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Nov 12, 2023Updated 2 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆106Jul 11, 2021Updated 4 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆825Aug 8, 2023Updated 2 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆33Apr 15, 2022Updated 3 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆950Dec 3, 2025Updated 3 months ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆224Aug 8, 2023Updated 2 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- ☆10Apr 10, 2024Updated last year
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- A collection of infosec related scripts and information.☆53Oct 2, 2024Updated last year
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Crawler that retrieves commoncrawl's crawled hosts and their corresponding IPs☆21Sep 1, 2025Updated 6 months ago
- ☆28Feb 7, 2021Updated 5 years ago
- Threat Intel Platform for T-POTs