As threats evolve, staying informed is crucial. Here’s a comprehensive list of tools to enhance your cybersecurity arsenal:1. IP & URL Reputation

  • 🌀 VirusTotal: https://www.virustotal.com/gui/home/upload – Analyzes files and URLs to detect malware and other threats using multiple antivirus engines.
  • 🌀 URLScan.io: https://urlscan.io – Scans and analyzes websites to identify potentially malicious content and detailed site activity.
  • 🌀 AbuseIPDB: https://abuseipdb.com – Allows reporting and checking IP addresses associated with malicious activity to combat abuse.
  • 🌀 Cisco Talos: https://talosintelligence.com/reputation_center/ – Provides threat intelligence and research to help detect and respond to security threats.
  • 🌀 IBM X-Force: https://exchange.xforce.ibmcloud.com/ – Offers threat intelligence, incident response, and research services to protect against global threats.
  • 🌀 Palo Alto Networks URL Filtering: https://urlfiltering.paloaltonetworks.com/ – Controls web access and blocks malicious websites to protect users.
  • 🌀 Symantec URL Filtering: https://sitereview.symantec.com/ – Blocks access to websites based on reputation and categorization to prevent web-based threats.
  • 🌀 IPVoid: https://ipvoid.com – Provides information about IP addresses, including geolocation and abuse reports.
  • 🌀 URLVoid: https://urlvoid.com – Analyzes websites for potential malicious activity using multiple blacklists and reputation services.

2. File | Hash | Search | Analysis | Sandboxing

3. File Hash

  • 🌀 HashTools (Windows): https://www.binaryfortress.com/HashTools/ – Generates and verifies file hashes on Windows.
  • 🌀 QuickHash (macOS): https://quickhash-gui.org/ – Generates file hashes on macOS.
  • 🌀 PowerShell:
    powershell
    Get-FileHash -Path C:\path\to\file.txt -Algorithm MD5
    Get-FileHash -InputObject "This is a string" -Algorithm MD5

    🌀 Terminal (macOS):
  • text
    shasum -a 256 filename

4. Find Suspicious Artifacts | Reverse Engineer | Debug Files

5. Monitor System Resources | Detect Malware

6. Web Proxy

7. Malware Samples

These resources are invaluable for threat intelligence, malware analysis, and maintaining a strong security posture.

Published On: July 31, 2024 / Categories: OSINT Tool /