ANY.RUN is an interactive online malware sandbox that provides real-time interaction, network tracking, process monitoring, and MITRE ATT&CK mapping, allowing researchers to analyze malware behavior and make adjustments during the analysis process. The service offers a range of features, including registry tracking, network requests, and static analysis, as well as a threat intelligence database contributed by a community of researchers from around the world. ANY.RUN is a cloud-based sandbox that provides a convenient and secure way to analyze malware, allowing researchers to watch the epidemic as if it was on their own computer, but with more features and security.
FEATURES
ALTERNATIVES
Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.
A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.
Back-end component for red team operations with crucial design considerations.
A digital archive of the internet, allowing users to capture and browse archived web pages.
A tool for automated security scanning of web applications and manual penetration testing.
A document that helps inform red team planning by contrasting against the very specific red team style described in Red Teams.
Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset
Explore the top million websites, ranked by referring subnets, and gain insights into online influence and popularity.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.