Skip to content
@qeeqbox

QeeqBox

State-of-the-art opensource projects and services for red, purple, and blue teams

Pinned Loading

  1. social-analyzer Public

    API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites

    JavaScript 12.2k 959

  2. analyzer Public

    Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)

    Python 281 60

  3. chameleon Public

    19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNE…

    Dockerfile 674 116

  4. url-sandbox Public

    Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks

    Python 178 53

  5. raven Public

    Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)

    JavaScript 183 48

  6. honeypots Public

    30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, si…

    Python 754 119

Repositories

Showing 10 of 90 repositories
  • honeypots Public

    30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)

    Python 754 AGPL-3.0 119 5 4 Updated Jan 31, 2025
  • social-analyzer Public

    API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites

    JavaScript 12,177 AGPL-3.0 959 9 4 Updated Jan 13, 2025
  • analyzer Public

    Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)

    Python 281 AGPL-3.0 60 1 0 Updated Apr 15, 2024
  • threat-intelligence Public

    Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, and future cyber threats (Collecting information about a potential threat, then analyzing that information to learn more about the negative events)

    9 AGPL-3.0 0 0 0 Updated Feb 18, 2024
  • data-lifecycle-management Public

    Data Lifecycle Management (DLM) is a policy-based model for managing data in an organization

    1 AGPL-3.0 0 0 0 Updated Jan 29, 2024
  • cyber-kill-chain Public

    Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks

    10 AGPL-3.0 4 0 0 Updated Jan 29, 2024
  • two-factor-authentication-sim-swapping Public

    An adversary may utilize a sim swapping attack for defeating 2fa authentication

    14 AGPL-3.0 3 0 0 Updated Jan 29, 2024
  • two-factor-authentication-sim-cloning Public

    An adversary may utilize a sim swapping attack for defeating 2fa authentication

    14 AGPL-3.0 3 0 0 Updated Jan 29, 2024
  • digital-forensics Public

    Digital Forensics is the process of finding and analyzing electronic data

    4 AGPL-3.0 1 0 0 Updated Jan 29, 2024
  • cybersecurity Public

    Cybersecurity is the measures taken to protect networks, devices, and data against cyberattacks

    4 AGPL-3.0 0 0 0 Updated Jan 29, 2024

Top languages

Loading…

Most used topics

Loading…