BlueBox Malware Analysis Box and Cyber Threat Hunting Logo

BlueBox Malware Analysis Box and Cyber Threat Hunting

0
Free
Visit Website

BlueBox is an Open Source Intelligence (OSINT) solution that provides threat intelligence data about specific files, IPs, domains, and URLs, allowing for quick analysis of suspicious files or malware. It offers enrichment of threat intelligence for malware and observables, scales out to speed up threat info retrieval, and includes features such as static analysis of files, detection using YARA rules, machine learning for URL and phishing website detection, and extraction of lexical features to aid in identifying malicious websites. The application is built with Python3, Flask, JavaScript, Bootstrap, SQLAlchemy, Scikit-learn, JSON, and YARA rules.

FEATURES

ALTERNATIVES

A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.

A daily updated summary of security advisories from various sources

Tool for visualizing correspondences between YARA ruleset and samples

A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.

Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.

A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.

A nonprofit security organization that collects and shares threat data to make the Internet more secure.

PINNED

InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Commercial
Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Free
Resources
Kriptos Logo

Kriptos

An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

Commercial
Data Protection
System Two Security Logo

System Two Security

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Commercial
Security Operations
Aikido Security Logo

Aikido Security

Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Commercial
Application Security
Permiso Logo

Permiso

Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Commercial
IAM
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Commercial
Cloud Security
Adversa AI Logo

Adversa AI

Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.

Commercial
AI Security
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2025 - All rights reserved