A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities Create …

A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities Create …
Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files. Done Related domains, IPs collect …
IBM Security X-FORCE Exchange library in Python 3. Search: threat_activities, threat_groups, malware_analysis, collector and industries. pip3 install XForce Using you API_KEY make …
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Kernel callbacks and …
Monitor the Internet’s background noise Melody is a transparent internet sensor built for threat intelligence and supported by a detection …
Raven – Advanced Cyber Threat Map (Simplified, customizable and responsive. It uses D3.js with TOPO JSON, has 247 countries, ~100,000 …
VERSION 3.6 Code efficiency enhancements and bug fixes for plugins, and improved logging. Significant UI/UX enhancements. Organisation specific settings and …
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. …
PatrOwl provides scalable, free and open-source solutions for orchestrating Security Operations and providing Threat Intelligence feeds. PatrowlHears is an advanced …
Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation. It should …