0 0
Read Time:56 Second

Online sandboxes.

#Phishing is one of the most common attack vectors today, and one of the most popular areas of Social Engineering. Today I suggest that you familiarize yourself with useful resources with which you will protect yourself from phishing.

• Decoders of short URL links and checking links for viruses:
https://scanurl.net/
https://longurl.info/
https://unshorten.me/
http://www.trueurl.net/
http://checkshorturl.com
http://www.untinyurl.com
https://vms.drweb.ru/online/
https://opentip.kaspersky.com/
https://iplogger.ru/url-checker/
https://www.virustotal.com/gui/home/url

• Online sandboxes:
https://any.run
https://cuckoo.cert.ee
https://www.hybrid-analysis.com
http://www.cpcheckme.com/checkme
https://threatpoint.checkpoint.com/ThreatPortal/emulation

• Online antiviruses:
https://online.drweb.com/
https://www.virustotal.com/ru/
https://opentip.kaspersky.com/
https://www.esetnod32.ru/home/products/online-scanner/

• Anonymity check:
https://amiunique.org/fp
http://proiptest.com/test/
https://proxy6.net/privacy
https://webkay.robinlinus.com/
https://coveryourtracks.eff.org/
https://browsercheck.qualys.com/
http://www.hackerwatch.org/probe/
http://www.cpcheckme.com/checkme/

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence