SeaSponge Logo

SeaSponge

0
Free
Visit Website

SeaSponge is an accessible web-based threat modeling tool developed for Mozilla Winter of Security 2014. This web-based application is being developed with three characteristics in mind: Accessibility: We want everyone to be able to map out their infrastructures and generate security reports on any operating-system and on any browser. Aesthetics: We're tired of clunky, boring interfaces - we want to bring the pizazz into threat-modeling. Intuitive User-Experience: We hate manuals, and we want you to be able to use this software without one. Please see http://mozilla.github.io/seasponge/ for a live demo of the application. There is also a video on Air Mozilla available at https://air.mozilla.org/mozilla-winter-of-security-seasponge-a-tool-for-easy-threat-modeling/ Example Threat Model developed with SeaSponge Here is a share link for the SeaSponge threat model we developed in our Air Mozilla demo video: http://goo.gl/Q8mt0T Usage See our Usage page in our Wiki for more details. Authors Mathew Kallada Glavin Wiechert Joel Kuntz Sarah MacDonald With Mozilla Advisor Curtis Koenig and Professor Dr. Pawan Lingras Contributing Please see our Contributing Guidelines

FEATURES

ALTERNATIVES

ProcFilter is a process filtering system for Windows with built-in YARA integration, designed for malware analysts to create YARA signatures for Windows environments.

Check the reputation of an IP address to identify potential threats.

An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.

A PowerShell module for threat hunting via Windows Event Logs

Cisco Umbrella is a cloud security platform that offers protection against threats on the internet by blocking malicious activity.

An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.

VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.

Facilitates distribution of Threat Intelligence artifacts to defensive systems.