Skip to content
Investigation & Threat Intelligence
VirusTotal
-
What it does: Scans files, URLs, IPs, and domains using multiple security engines.
-
Who it’s for: Security analysts, researchers, and advanced users.
-
Practical use case: Check a suspicious attachment or file before opening it.
URLScan.io
-
What it does: Analyzes websites and displays detailed technical behavior such as scripts and network activity.
-
Who it’s for: Phishing investigators and security teams.
-
Practical use case: Safely inspect suspicious links.
Shodan
-
What it does: Scans files, URLs, IPs, and domains using multiple security engines.
-
Who it’s for: Security analysts, researchers, and advanced users.
-
Practical use case: Check a suspicious attachment or file before opening it.
AbuseIPDB
-
What it does: Checks whether an IP address has been reported for malicious activity.
-
What it does: Checks whether an IP address has been reported for malicious activity.
-
Practical use case: Verify suspicious login attempts or network traffic.
Breach & Identity Protection
Have I Been Pwned
-
What it does: Checks if an email or password has been exposed in known data breaches.
-
Who it’s for: Individuals and IT administrators.
-
Who it’s for: Individuals and IT administrators.
Malware Analysis
ANY.RUN
-
What it does: Interactive sandbox environment for safely analyzing suspicious files.
-
Who it’s for: Malware analysts and SOC teams.
-
Practical use case: Upload suspicious files to observe their behavior.
Hybrid Analysis
-
What it does: Automated malware analysis platform that provides detailed behavioral reports.
-
Who it’s for: Security researchers and analysts.
-
Practical use case: Submit suspicious files to review their behavior.
Breach & Identity Protection
Have I Been Pwned
-
What it does: Checks if an email or password has been exposed in known data breaches.
-
Who it’s for: Individuals and IT administrators.
-
Who it’s for: Individuals and IT administrators.
Malware Analysis
ANY.RUN
-
What it does: Interactive sandbox environment for safely analyzing suspicious files.
-
Who it’s for: Malware analysts and SOC teams.
-
Practical use case: Upload suspicious files to observe their behavior.
Hybrid Analysis
-
What it does: Automated malware analysis platform that provides detailed behavioral reports.
-
Who it’s for: Security researchers and analysts.
-
Practical use case: Submit suspicious files to review their behavior.
Privacy & Data Protectione
VeraCrypt
-
What it does: Encrypts files and entire storage drives to protect sensitive data.
-
Who it’s for: Individuals and professionals.
-
Practical use case: Protect important files if a device is lost or stolen.
Signal
-
What it does: Provides end-to-end encrypted messaging and secure calls.
-
Who it’s for: Individuals and teams.
-
Practical use case: Send sensitive information securely.
Tor Browser
-
What it does: Allows anonymous web browsing through the Tor network.
-
What it does: Allows anonymous web browsing through the Tor network.
-
Practical use case: Browse anonymously to protect identity and location.
Investigation & Threat Intelligence
VirusTotal
-
What it does: Scans files, URLs, IPs, and domains using multiple security engines.
-
Who it’s for: Security analysts, researchers, and advanced users.
-
Practical use case: Check a suspicious attachment or file before opening it.
URLScan.io
-
What it does: Analyzes websites and displays detailed technical behavior such as scripts and network activity.
-
Who it’s for: Phishing investigators and security teams.
-
Practical use case: Safely inspect suspicious links.
Shodan
-
What it does: Scans files, URLs, IPs, and domains using multiple security engines.
-
Who it’s for: Security analysts, researchers, and advanced users.
-
Practical use case: Check a suspicious attachment or file before opening it.
AbuseIPDB
-
What it does: Checks whether an IP address has been reported for malicious activity.
-
What it does: Checks whether an IP address has been reported for malicious activity.
-
Practical use case: Verify suspicious login attempts or network traffic.
Breach & Identity Protection
Have I Been Pwned
-
What it does: Checks if an email or password has been exposed in known data breaches.
-
Who it’s for: Individuals and IT administrators.
-
Who it’s for: Individuals and IT administrators.
Malware Analysis
ANY.RUN
-
What it does: Interactive sandbox environment for safely analyzing suspicious files.
-
Who it’s for: Malware analysts and SOC teams.
-
Practical use case: Upload suspicious files to observe their behavior.
Hybrid Analysis
-
What it does: Automated malware analysis platform that provides detailed behavioral reports.
-
Who it’s for: Security researchers and analysts.
-
Practical use case: Submit suspicious files to review their behavior.
Privacy & Data Protection
VeraCrypt
-
What it does: Encrypts files and entire storage drives to protect sensitive data.
-
Who it’s for: Individuals and professionals.
-
Practical use case: Protect important files if a device is lost or stolen.
Signal
-
What it does: Provides end-to-end encrypted messaging and secure calls.
-
Who it’s for: Individuals and teams.
-
Practical use case: Send sensitive information securely.
Tor Browser
-
What it does: Allows anonymous web browsing through the Tor network.
-
What it does: Allows anonymous web browsing through the Tor network.
-
Practical use case: Browse anonymously to protect identity and location.
VirusTotal
-
What it does: Scans files, URLs, IPs, and domains using multiple security engines.
-
Who it’s for: Security analysts, researchers, and advanced users.
-
Practical use case: Check a suspicious attachment or file before opening it.
URLScan.io
-
What it does: Analyzes websites and displays detailed technical behavior such as scripts and network activity.
-
Who it’s for: Phishing investigators and security teams.
-
Practical use case: Safely inspect suspicious links.
Shodan
-
What it does: Scans files, URLs, IPs, and domains using multiple security engines.
-
Who it’s for: Security analysts, researchers, and advanced users.
-
Practical use case: Check a suspicious attachment or file before opening it.
AbuseIPDB
-
What it does: Checks whether an IP address has been reported for malicious activity.
-
What it does: Checks whether an IP address has been reported for malicious activity.
-
Practical use case: Verify suspicious login attempts or network traffic.
-
What it does: Scans files, URLs, IPs, and domains using multiple security engines.
-
Who it’s for: Security analysts, researchers, and advanced users.
-
Practical use case: Check a suspicious attachment or file before opening it.
-
What it does: Analyzes websites and displays detailed technical behavior such as scripts and network activity.
-
Who it’s for: Phishing investigators and security teams.
-
Practical use case: Safely inspect suspicious links.
-
What it does: Scans files, URLs, IPs, and domains using multiple security engines.
-
Who it’s for: Security analysts, researchers, and advanced users.
-
Practical use case: Check a suspicious attachment or file before opening it.
-
What it does: Checks whether an IP address has been reported for malicious activity.
-
What it does: Checks whether an IP address has been reported for malicious activity.
-
Practical use case: Verify suspicious login attempts or network traffic.
Have I Been Pwned
-
What it does: Checks if an email or password has been exposed in known data breaches.
-
Who it’s for: Individuals and IT administrators.
-
Who it’s for: Individuals and IT administrators.
-
What it does: Checks if an email or password has been exposed in known data breaches.
-
Who it’s for: Individuals and IT administrators.
-
Who it’s for: Individuals and IT administrators.
ANY.RUN
-
What it does: Interactive sandbox environment for safely analyzing suspicious files.
-
Who it’s for: Malware analysts and SOC teams.
-
Practical use case: Upload suspicious files to observe their behavior.
Hybrid Analysis
-
What it does: Automated malware analysis platform that provides detailed behavioral reports.
-
Who it’s for: Security researchers and analysts.
-
Practical use case: Submit suspicious files to review their behavior.
-
What it does: Interactive sandbox environment for safely analyzing suspicious files.
-
Who it’s for: Malware analysts and SOC teams.
-
Practical use case: Upload suspicious files to observe their behavior.
-
What it does: Automated malware analysis platform that provides detailed behavioral reports.
-
Who it’s for: Security researchers and analysts.
-
Practical use case: Submit suspicious files to review their behavior.
VeraCrypt
-
What it does: Encrypts files and entire storage drives to protect sensitive data.
-
Who it’s for: Individuals and professionals.
-
Practical use case: Protect important files if a device is lost or stolen.
Signal
-
What it does: Provides end-to-end encrypted messaging and secure calls.
-
Who it’s for: Individuals and teams.
-
Practical use case: Send sensitive information securely.
Tor Browser
-
What it does: Allows anonymous web browsing through the Tor network.
-
What it does: Allows anonymous web browsing through the Tor network.
-
Practical use case: Browse anonymously to protect identity and location.
-
What it does: Encrypts files and entire storage drives to protect sensitive data.
-
Who it’s for: Individuals and professionals.
-
Practical use case: Protect important files if a device is lost or stolen.
-
What it does: Provides end-to-end encrypted messaging and secure calls.
-
Who it’s for: Individuals and teams.
-
Practical use case: Send sensitive information securely.
-
What it does: Allows anonymous web browsing through the Tor network.
-
What it does: Allows anonymous web browsing through the Tor network.
-
Practical use case: Browse anonymously to protect identity and location.