AttackCapture™
AttackCapture™
This powerful feature that enables you to uncover and mitigate potential cyber threats within exposed directories.
This powerful feature that enables you to uncover and mitigate potential cyber threats within exposed directories.
Features
Features
MITRE ATT&CK® Techniques
MITRE ATT&CK® Techniques
We now list MITRE ATT&CK® Techniques on each open directory and sandboxed item. MITRE Enterprise, ICS and Mobile tags are used. Files are sandboxed and tagged to allow overview and searching to understand the attack TTPs. You can see them on the listing page as well as find other open directories that have the same settings.
We now list MITRE ATT&CK® Techniques on each open directory and sandboxed item. MITRE Enterprise, ICS and Mobile tags are used. Files are sandboxed and tagged to allow overview and searching to understand the attack TTPs. You can see them on the listing page as well as find other open directories that have the same settings.
Full Text Code Searching
Full Text Code Searching
Search all the code and text files across our entire archive for patterns to find unique exploits, reverse shells and more. Also, search by many more fields to narrow down what you're looking for.
Search all the code and text files across our entire archive for patterns to find unique exploits, reverse shells and more. Also, search by many more fields to narrow down what you're looking for.
Flagging of Credentials
Flagging of Credentials
Credentials are now automatically located inside of attacker content to help you correlate directories and narrow the unique attributes of the attacker.
Credentials are now automatically located inside of attacker content to help you correlate directories and narrow the unique attributes of the attacker.
Download a Password Protected Zip
Download a Password Protected Zip
Receive any file from an open directory as a password protected zip to make it easier to transfer the files to protected environments without getting blocked.
Receive any file from an open directory as a password protected zip to make it easier to transfer the files to protected environments without getting blocked.
Code Syntax Highlighter
Code Syntax Highlighter
Instantly view any code from the open directories with a syntax highlighted version. Works with most languages making easy previews.
Instantly view any code from the open directories with a syntax highlighted version. Works with most languages making easy previews.
More Files Sandboxed - automatically
More Files Sandboxed - automatically
You've asked for it and we've added it - we are now automatically sandboxing many more file types and will continue to add coverage.
You've asked for it and we've added it - we are now automatically sandboxing many more file types and will continue to add coverage.
Open Directories for Attributed IOCs
Open Directories for Attributed IOCs
Automatically chain together public research with our to see the full attack for a certain threat actor to understand their full TTPs.
Automatically chain together public research with our to see the full attack for a certain threat actor to understand their full TTPs.
Attack files by Scan Signature
Attack files by Scan Signature
You can get a view of open directories for Scanned C2s. These are fully identified servers behaving like C2s to allow you to explore the actual files on the server.
You can get a view of open directories for Scanned C2s. These are fully identified servers behaving like C2s to allow you to explore the actual files on the server.
Attack files by File Signature
Attack files by File Signature
Search the open directories that contain executables of an identified malware.
Search the open directories that contain executables of an identified malware.
Malicious Tags now on the Search Page
Malicious Tags now on the Search Page
When doing file name searches, you can see tags that come off of the sandboxes.
When doing file name searches, you can see tags that come off of the sandboxes.
Editorial Observations
Editorial Observations
Our team now puts hand written descriptions analyzing novel and important directories to save you time and narrow down things you're interested in.
Our team now puts hand written descriptions analyzing novel and important directories to save you time and narrow down things you're interested in.
AttackCapture™ Counter Intelligence
AttackCapture™ Counter Intelligence
This powerful feature that enables you to uncover and mitigate potential cyber threats within exposed directories. With this feature, you can detect malicious open directories, secure sandbox malware, download comprehensive file archives, identify exploit kits and reconnaissance tools, discover log files and potential victims, and access downloads of malware and unseen exploits.
This powerful feature that enables you to uncover and mitigate potential cyber threats within exposed directories. With this feature, you can detect malicious open directories, secure sandbox malware, download comprehensive file archives, identify exploit kits and reconnaissance tools, discover log files and potential victims, and access downloads of malware and unseen exploits.
Threat Hunting Platform - Hunt.io
Products
Hunt Intelligence, Inc.
Threat Hunting Platform - Hunt.io
Products
Hunt Intelligence, Inc.
Threat Hunting Platform - Hunt.io
Products
Hunt Intelligence, Inc.