Skip to content
@qeeqbox

QeeqBox

State-of-the-art opensource projects and services for red, purple, and blue teams

Pinned

  1. API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites

    JavaScript 10.2k 825

  2. analyzer Public

    Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)

    Python 215 57

  3. chameleon Public

    19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNE…

    Dockerfile 579 114

  4. url-sandbox Public

    Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks

    Python 141 47

  5. raven Public

    Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)

    JavaScript 121 39

  6. honeypots Public

    30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, si…

    Python 421 84

Repositories

  • cross-site-request-forgery Public

    A threat actor may trick an authenticated or trusted victim into executing unauthorized actions on their behalf

    1 0 0 0 Updated Jun 23, 2023
  • local-file-inclusion Public

    A threat actor may cause a vulnerable target to include/retrieve local file

    1 0 0 0 Updated Jun 23, 2023
  • remote-file-inclusion Public

    A threat actor may cause a vulnerable target to include/retrieve remote file

    1 0 0 0 Updated Jun 23, 2023
  • insecure-deserialization Public

    A threat actor may tamper with a stream that gets deserialized on the target, causing the target to access data or perform non-intended actions

    1 0 0 0 Updated Jun 22, 2023
  • xslt-injection Public

    A threat actor may interfere with an application's processing of extensible stylesheet language transformations (XSLT) for extensible markup language (XML) to read or modify data on the target

    2 0 0 0 Updated Jun 19, 2023
  • server-side-template-injection Public

    A threat actor may alter the template syntax on the vulnerable target to execute commands

    1 0 0 0 Updated Jun 19, 2023
  • sql-injection Public

    A threat actor may alter structured query language (SQL) query to read, modify and write to the database or execute administrative commands for further chained attacks

    1 0 0 0 Updated Jun 19, 2023
  • xxe-injection Public

    A threat actor may interfere with an application's processing of extensible markup language (XML) data to view the content of a target's files

    2 0 0 0 Updated Jun 19, 2023
  • os-command-injection Public

    A threat actor may inject arbitrary operating system (OS) commands on target

    1 0 0 0 Updated Jun 19, 2023
  • open-redirect Public

    A threat actor may send a malicious redirection request for a vulnerable target to a victim; the victim gets redirected to a malicious website that downloads an executable file

    3 0 0 0 Updated Jun 19, 2023