An open API service indexing awesome lists of open source software.

Projects in Awesome Lists by qeeqbox

A curated list of projects in awesome lists by qeeqbox .

https://github.com/qeeqbox/honeypots

30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)

credentials emulator honeypot honeypots malware-analysis monitoring-tool network-analysis pypi pypi-package python twisted

Last synced: 14 May 2025

https://github.com/qeeqbox/chameleon

19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)

chameleon credentials emulator grafana-interface honeypot honeypots low-interaction monitoring network proxy scan threat-hunting

Last synced: 05 Mar 2025

https://github.com/qeeqbox/analyzer

Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)

analysis analyzer malware malware-analysis osint phishing python visualizes

Last synced: 06 Apr 2025

https://github.com/qeeqbox/raven

Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)

attack countries cyberattack d3js maps raven threat-hunting threat-intelligence visualization world

Last synced: 17 Mar 2025

https://github.com/qeeqbox/url-sandbox

Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks

ads analyzer analyzing-urls docker domain malware phishing python sandbox url websites

Last synced: 19 Dec 2024

https://github.com/qeeqbox/docker-images

Kali and Parrot OS docker images accessible via VNC, RDP and Web

docker-images kali kalilinux parrot parrot-os rdp vnc web

Last synced: 05 Mar 2025

https://github.com/qeeqbox/mitre-visualizer

🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)

advanced-persistent-threat attack malware mitre network-graph tactic technique tool

Last synced: 13 Apr 2025

https://github.com/qeeqbox/osint

Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) with this python package

dns osint ping python scan scraper tool traceroute whois

Last synced: 13 Apr 2025

https://github.com/qeeqbox/rhino

Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors

agile analysis api behavior customizable linux macos malware react-interface sandbox virtualbox vms webinterface windows

Last synced: 13 Apr 2025

https://github.com/qeeqbox/woodpecker

Custom security distro for remote penetration testing

linux pentest security security-tools tor ubuntu vpn

Last synced: 13 Apr 2025

https://github.com/qeeqbox/seahorse

ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)

elastic filebeat honeypot http https kibana ldap logstash mongo mysql rdp redis smb ssh vnc

Last synced: 13 Apr 2025

https://github.com/qeeqbox/image-analyzer

Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)

deep-learning image-analyzer interface keras nsfw nsfw-recognition python3 server transfer-learning

Last synced: 10 Apr 2025

https://github.com/qeeqbox/octopus

Pure Honeypots with an automated bash script

automated bash-script honeypot honeypots linux pure

Last synced: 13 Apr 2025

https://github.com/qeeqbox/cyber-attacks

A collection of attacks metadata that were used in my previous pen-test tools

attacks cyber vulnerabilities

Last synced: 05 Mar 2025

https://github.com/qeeqbox/reports

Recent cyber attacks reports & interesting analysis files

attack cyber report research threat-hunting threat-intelligence

Last synced: 05 Mar 2025

https://github.com/qeeqbox/two-factor-authentication-sim-cloning

An adversary may utilize a sim swapping attack for defeating 2fa authentication

2factor authintacation bypass infosecsimplified qeeqbox vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/apt-malware-reports-set-1

Some extracted Features\IoCs\Artifacts\Patterns from APT Malware

Last synced: 05 Mar 2025

https://github.com/qeeqbox/falcon

Collection of exploits that were verified by an automated system

cve exploit patch python

Last synced: 13 Apr 2025

https://github.com/qeeqbox/two-factor-authentication-sim-swapping

An adversary may utilize a sim swapping attack for defeating 2fa authentication

2fa example infosecsimplified metadata qeeqbox sim swapping visualization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/worldmap

An interactive world-map that has been used in live Cyber Threat interfaces

cities countries d3 interactive worldmap

Last synced: 13 Apr 2025

https://github.com/qeeqbox/threat-intelligence

Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, and future cyber threats (Collecting information about a potential threat, then analyzing that information to learn more about the negative events)

cycle infosecsimplified qeeqbox threat-intelligence

Last synced: 05 Mar 2025

https://github.com/qeeqbox/cyber-kill-chain

Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks

chain cyberattack infosecsimplified kill lifecycle qeeqbox

Last synced: 05 Mar 2025

https://github.com/qeeqbox/ixora

Internal package for visualization

graph

Last synced: 05 Mar 2025

https://github.com/qeeqbox/world-json

Multiple JSON files contain world cities with names, longitude & latitude, country, and timezone

cities countries geo json latitude longitude metadata timezones

Last synced: 13 Apr 2025

https://github.com/qeeqbox/automation-protocols-metadata

JSON file that contains an update metadata of Automation Protocols (Industrial control system, process automation, building automation, automatic meter reading, and automobile)

automatic-meter automobile building-automation ics-security metadata process-automation protocols

Last synced: 05 Mar 2025

https://github.com/qeeqbox/incident-response

Incident response is a set of steps that are used to handle the aftermath of a data breach or cyberattack

cycle incident-response infosecsimplified qeeqbox

Last synced: 05 Mar 2025

https://github.com/qeeqbox/ics-visualizer

ICS-Visualizer is an interactive Industrial Control Systems (ICS) network graph that contains up-to-date related automation protocols metadata (Name, company, port, user manuals, external links, and mapped wireshark\namp modules and scripts).

Last synced: 13 Apr 2025

https://github.com/qeeqbox/mobile-numbers-metadata

JSON file contains all mobile number metadata (Country, prefix, and carrier)

country json metadata mobile number phone

Last synced: 16 Jan 2025

https://github.com/qeeqbox/countries-metadata

JSON file contains all countries metadata (Country name, cc, a3, and flag)

a3 cc country flag json metadata

Last synced: 16 Jan 2025

https://github.com/qeeqbox/digital-forensics

Digital Forensics is the process of finding and analyzing electronic data

cycle digital-forensics infosecsimplified qeeqbox visualization

Last synced: 05 Mar 2025

https://github.com/qeeqbox/two-factor-authentication-brute-force

A threat actor may lunch brute force to the two-factor authentication (2FA) logic causing unauthorized access to the target

2fa authentication brute-force example infosecsimplified qeeqbox visualization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/ports-metadata

JSON file contains all ports metadata

json metadata network ports

Last synced: 05 Mar 2025

https://github.com/qeeqbox/reflected-cross-site-scripting

A threat actor may inject malicious content into HTTP requests. The content will be reflected in the HTTP response and executed in the victim's browser

cross infosecsimplified metadata qeeqbox reflected scripting site visualization vulnerability xss

Last synced: 05 Mar 2025

https://github.com/qeeqbox/vertical-privilege-escalation

A threat actor may perform unauthorized functions belonging to another user with a higher privileges level

escalation example infosecsimplified metadata privilege qeeqbox vertical visualization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/risk-management

Risk management is the process of identifying, assessing, treating, and monitoring any negative events that affect a company's ability to operate (Preventing them or minimizing their harmful impact)

cycle infosecsimplified risk-management visualization

Last synced: 05 Mar 2025

https://github.com/qeeqbox/directory-listing

A threat actor may list files on a misconfigured server

directory infosecsimplified listing qeeqbox vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/dom-based-cross-site-scripting

A threat actor may inject malicious content into HTTP requests. The content is not reflected in the HTTP response and executed in the victim's browser.

cross dom example infosecsimplified metadata qeeqbox scripting site vulnerability xss xss-vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/data-compliance

Data compliance is the process of following various regulations and standards to ensure that sensitive digital assets (data) are guarded against loss, theft, and misuse

compliance data data-compliance infosecsimplified qeeqbox

Last synced: 05 Mar 2025

https://github.com/qeeqbox/cybersecurity

Cybersecurity is the measures taken to protect networks, devices, and data against cyberattacks

cybersecurity cycle infosecsimplified qeeqbox visualization

Last synced: 05 Mar 2025

https://github.com/qeeqbox/client-side-template-injection

A threat actor may trick a victim into executing native template syntax on a vulnerable target

client infosecsimplified injection qeeqbox side template vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/open-redirect

A threat actor may send a malicious redirection request for a vulnerable target to a victim; the victim gets redirected to a malicious website that downloads an executable file

infosecsimplified open qeeqbox redirect vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/proxy-firewall

HTTPS Proxy Firewall for testing

Last synced: 05 Mar 2025

https://github.com/qeeqbox/private-ip-metadata

JSON file contains all private ip ranges with description

ip metadata private

Last synced: 05 Mar 2025

https://github.com/qeeqbox/horizontal-privilege-escalation

A threat actor may perform unauthorized functions belonging to another user with a similar privileges level

escalation example horizontal infosecsimplified metadata privilege qeeqbox visualization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/threat-actors

A threat actor is any person, group, or entity that could harm to the cyber realm

infosecsimplified qeeqbox threat-actors

Last synced: 05 Mar 2025

https://github.com/qeeqbox/minimal-server

Asyncio websocket http server [Needed for internal testing]

asyncio http minimal server websockets

Last synced: 05 Mar 2025

https://github.com/qeeqbox/credential-stuffing

A threat actor may guess the target credentials using a known username and password pairs gathered from previous brute-force attacks

credentials example infosecsimplified metadta qeeqbox stuffing visualization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/authentication-bypass

A threat actor may gain access to data and functionalities by bypassing the target authentication mechanism

authentication bypass example infosecsimplified metadata qeeqbox visualization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/xxe-injection

A threat actor may interfere with an application's processing of extensible markup language (XML) data to view the content of a target's files

infosecsimplified injection metadata qeeqbox visualization vulnerability xee xml xxe xxe-injection

Last synced: 05 Mar 2025

https://github.com/qeeqbox/session-fixation

A threat actor may trick a user into using a known session identifier to log in. after logging in, the session identifier is used to gain access to the user's account

example fixation infosecsimplified metadata qeeqbox session visualization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/default-credential

A threat actor may gain unauthorized access using the default username and password

credentials default example infosecsimplified metadata qeeqbox visualization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/public-ip-metadata

JSON file contains all public ip ranges with description

ips metadata public

Last synced: 05 Mar 2025

https://github.com/qeeqbox/xslt-injection

A threat actor may interfere with an application's processing of extensible stylesheet language transformations (XSLT) for extensible markup language (XML) to read or modify data on the target

infosecsimplified injection qeeqbox vulnerability xslt

Last synced: 05 Mar 2025

https://github.com/qeeqbox/session-hijacking

A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier

example hijacking infosecsimplified metadata qeeqbox session visualization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/captcha-bypass

A threat actor may bypass the Completely Automated Public Turing test to tell Computers and Humans Apart (captcha) by breaking the solving logic, human-assisted solving services, or utilizing automated technology

bypass captcha example infosecsimplified metadata qeeqbox visulization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/authorization-bypass

A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier

authorization bypass example infosecsimplified metadata qeeqbox vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/icterid-template

Icterid Webapp Template

app qeeqbox template web

Last synced: 05 Mar 2025

https://github.com/qeeqbox/.github

Github Settings

Last synced: 05 Mar 2025

https://github.com/qeeqbox/security-controls

Countermeasures or safeguards for detecting, preventing, and mitigating cyber threats and attacks (Protect assets)

controls infosecsimplified qeeqbox security security-controls

Last synced: 05 Mar 2025

https://github.com/qeeqbox/sql-injection

A threat actor may alter structured query language (SQL) query to read, modify and write to the database or execute administrative commands for further chained attacks

infosecsimplified metadata qeeqbox sql-injection visualization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/remote-file-inclusion

A threat actor may cause a vulnerable target to include/retrieve remote file

file inclusion infosecsimplified qeeqbox remote vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/password-spraying

A threat actor may guess the target credentials using a single password with a large set of usernames against the target

example infosecsimplified metadata password qeeqbox spraying visualization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/session-replay

A threat actor may re-use a stolen or leaked session identifier to access the user's account

example infosecsimplified metadata qeeqbox replay session visualization vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/server-side-template-injection

A threat actor may alter the template syntax on the vulnerable target to execute commands

infosecsimplified injection qeeqbox server side template vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/global-scripts

Some scripts for workflows (Moved from Macaw)

Last synced: 05 Mar 2025

https://github.com/qeeqbox/insecure-deserialization

A threat actor may tamper with a stream that gets deserialized on the target, causing the target to access data or perform non-intended actions

deserialization infosecsimplified insecure qeeqbox vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/local-file-inclusion

A threat actor may cause a vulnerable target to include/retrieve local file

file include infosecsimplified local qeeqbox vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/data-security

Safeguarding your personal information (How your info is protected)

data data-security infosecsimplified qeeqbox security

Last synced: 05 Mar 2025

https://github.com/qeeqbox/data-states

Data states refer to structured and unstructured data divided into three categories (At Rest, In Use, and In Transit)

data data-state infosecsimplified qeeqbox

Last synced: 05 Mar 2025

https://github.com/qeeqbox/tornado-websockets-redis-server

tornado websockets redis server (Needed for internal testing)

redis tornado websockets

Last synced: 05 Mar 2025

https://github.com/qeeqbox/identity-and-access-management

The practice of ensuring that people or objects have the right level of access to assets

access iaaa identity infosecsimplified management qeeqbox

Last synced: 05 Mar 2025

https://github.com/qeeqbox/data-lifecycle-management

Data Lifecycle Management (DLM) is a policy-based model for managing data in an organization

data data-lifecycle-management infosecsimplified lifecycle management qeeqbox

Last synced: 05 Mar 2025

https://github.com/qeeqbox/cross-site-request-forgery

A threat actor may trick an authenticated or trusted victim into executing unauthorized actions on their behalf

cross example forgery infosecsimplified metadata qeeqebox request site vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/os-command-injection

A threat actor may inject arbitrary operating system (OS) commands on target

command infosecsimplified injection os os-command-injection qeeqbox vulnerability

Last synced: 05 Mar 2025

https://github.com/qeeqbox/data-classification

Data classification defines and categorizes data according to its type, sensitivity, and value

classification data data-classification infosecsimplified qeeqbox

Last synced: 05 Mar 2025

https://github.com/qeeqbox/xpath-injection

A threat actor may alter the XML path language (XPath) query to read data on the target

infosecsimplified injection metadata qeeqbox visualization vulnerability xpath xpath-injection

Last synced: 05 Mar 2025

https://github.com/qeeqbox/access-control

Access Control is using security techniques to protect a system against unauthorized access

access access-control control infosecsimplified qeeqbox

Last synced: 05 Mar 2025

https://github.com/qeeqbox/asynico-websockets-redis-server

asynico websockets redis server (Needed for internal testing)

asyncio redis websockets

Last synced: 05 Mar 2025

https://github.com/qeeqbox/oxen-template

Tasker for internal projects

celery docker docker-compose python3

Last synced: 05 Mar 2025

https://github.com/qeeqbox/nginx-reverse-proxy

Nginx reverse proxy for testing

nginx reverse-proxy testing

Last synced: 05 Mar 2025