AttackCapture

AttackCapture

AttackCapture

AttackCapture

This powerful feature that enables you to uncover and mitigate potential cyber threats within exposed directories.

This powerful feature that enables you to uncover and mitigate potential cyber threats within exposed directories.

Exposed Open Directories

Features

Features

MITRE ATT&CK® Techniques

MITRE ATT&CK® Techniques

MITRE ATT&CK® Techniques

We now list MITRE ATT&CK® Techniques on each open directory and sandboxed item. MITRE Enterprise, ICS and Mobile tags are used.  Files are sandboxed and tagged to allow overview and searching to understand the attack TTPs.  You can see them on the listing page as well as find other open directories that have the same settings.

We now list MITRE ATT&CK® Techniques on each open directory and sandboxed item. MITRE Enterprise, ICS and Mobile tags are used.  Files are sandboxed and tagged to allow overview and searching to understand the attack TTPs.  You can see them on the listing page as well as find other open directories that have the same settings.

Full Text Code Searching

Full Text Code Searching

Full Text Code Searching

Search all the code and text files across our entire archive for patterns to find unique exploits, reverse shells and more.  Also, search by many more fields to narrow down what you're looking for.

Search all the code and text files across our entire archive for patterns to find unique exploits, reverse shells and more.  Also, search by many more fields to narrow down what you're looking for.

Flagging of Credentials

Flagging of Credentials

Flagging of Credentials

Credentials are now automatically located inside of attacker content to help you correlate directories and narrow the unique attributes of the attacker.

Credentials are now automatically located inside of attacker content to help you correlate directories and narrow the unique attributes of the attacker.

Download a Password Protected Zip

Download a Password Protected Zip

Download a Password Protected Zip

Receive any file from an open directory as a password protected zip to make it easier to transfer the files to protected environments without getting blocked.

Receive any file from an open directory as a password protected zip to make it easier to transfer the files to protected environments without getting blocked.

Code Syntax Highlighter

Code Syntax Highlighter

Code Syntax Highlighter

Instantly view any code from the open directories with a syntax highlighted version.  Works with most languages making easy previews.

Instantly view any code from the open directories with a syntax highlighted version.  Works with most languages making easy previews.

More Files Sandboxed - automatically

More Files Sandboxed - automatically

More Files Sandboxed - automatically

You've asked for it and we've added it - we are now automatically sandboxing many more file types and will continue to add coverage.

You've asked for it and we've added it - we are now automatically sandboxing many more file types and will continue to add coverage.

Open Directories for Attributed IOCs

Open Directories for Attributed IOCs

Open Directories for Attributed IOCs

Automatically chain together public research with our to see the full attack for a certain threat actor to understand their full TTPs.

Automatically chain together public research with our to see the full attack for a certain threat actor to understand their full TTPs.

Attack files by Scan Signature

Attack files by Scan Signature

Attack files by Scan Signature

You can get a view of open directories for Scanned C2s.  These are fully identified servers behaving like C2s to allow you to explore the actual files on the server.

You can get a view of open directories for Scanned C2s.  These are fully identified servers behaving like C2s to allow you to explore the actual files on the server.

Attack files by File Signature

Attack files by File Signature

Attack files by File Signature

Search the open directories that contain executables of an identified malware.

Search the open directories that contain executables of an identified malware.

Malicious Tags now on the Search Page

Malicious Tags now on the Search Page

Malicious Tags now on the Search Page

When doing file name searches, you can see tags that come off of the sandboxes.

When doing file name searches, you can see tags that come off of the sandboxes.

Editorial Observations

Editorial Observations

Editorial Observations

Our team now puts hand written descriptions analyzing novel and important directories to save you time and narrow down things you're interested in.

Our team now puts hand written descriptions analyzing novel and important directories to save you time and narrow down things you're interested in.

Open Directory Counter Intelligence

AttackCaptureCounter Intelligence

AttackCaptureCounter Intelligence

This powerful feature that enables you to uncover and mitigate potential cyber threats within exposed directories. With this feature, you can detect malicious open directories, secure sandbox malware, download comprehensive file archives, identify exploit kits and reconnaissance tools, discover log files and potential victims, and access downloads of malware and unseen exploits.

This powerful feature that enables you to uncover and mitigate potential cyber threats within exposed directories. With this feature, you can detect malicious open directories, secure sandbox malware, download comprehensive file archives, identify exploit kits and reconnaissance tools, discover log files and potential victims, and access downloads of malware and unseen exploits.