BlueBox Malware analysis Box and Cyber threat intelligence.
☆47Apr 17, 2022Updated 4 years ago
Alternatives and similar repositories for BlueBox
Users that are interested in BlueBox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆127Aug 13, 2021Updated 4 years ago
- Raf Scanner IDE☆12Apr 14, 2023Updated 3 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- Threat Hunting tool about Sysmon and graphs☆339May 28, 2023Updated 2 years ago
- ☆14Mar 5, 2021Updated 5 years ago
- Resources, Tips, Tricks , Resources, Notes and much more☆21Jan 12, 2023Updated 3 years ago
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- ☆23Jan 29, 2024Updated 2 years ago
- The project provides an automated deployment procedure for GNS3 server on a Google Compute Engine (GCE) VM instance.☆17Oct 1, 2020Updated 5 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Repository resource for threat hunter☆159Sep 14, 2018Updated 7 years ago
- OSED Practice binary☆26Nov 23, 2023Updated 2 years ago
- A Windows 11 Rootkit. (Exploit has been patched)☆17Sep 7, 2025Updated 7 months ago
- The Secure Coding Framework☆22Jun 19, 2020Updated 5 years ago
- Resources and notes for Offensive Security's SOC-200 course and OffSec Defense Analyst (OSDA) exam☆17May 19, 2023Updated 2 years ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11May 31, 2023Updated 2 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- Search Tinder Users With Filters☆15Jul 26, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆29Oct 10, 2023Updated 2 years ago
- Docker image storage backend for openBalena☆17Apr 22, 2026Updated last week
- Send High & New Incidents to The Hive incident management Platform☆18Feb 13, 2021Updated 5 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆111Jan 20, 2026Updated 3 months ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆580Mar 24, 2023Updated 3 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆48Apr 28, 2026Updated last week
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆105Apr 26, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Apr 30, 2021Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆15Aug 18, 2024Updated last year
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- USBGuardian is an open source and affordable USB malware cleaning station☆12Apr 2, 2022Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago