URL Sandbox automate the daily task of analyzing URL or Domains internally without external resources' interaction. It contains a sandbox module that executes the target in an isolated environment (Customizable). The output from that environment is parsed and structured into useful categories. Some of those categories are visualized for better user experience. This project is scalable and can be integrated into your SOC.
git clone https://github.com/qeeqbox/url-sandbox.git && cd url-sandbox && chmod +x run.sh && ./run.sh auto_configure
- Runs locally
- DNS info
- Headers info
- Brwoser info
- Certifcate extraction
- Target screenshot
- Network graph image
- Internal sniffer
- Custom User Agent
- Custom DNS and Proxy options
- Auto Tor configuration
- HTML and JSON output
- No-redirect option
git clone https://github.com/qeeqbox/url-sandbox.git
cd url-sandbox
chmod +x run.sh
./run.sh auto_configure
The project interface http://127.0.0.1:8000/ will open automatically after finishing the initialization process
ChromeDriver - WebDriver for Chrome, Docker SDK
By using this framework, you are accepting the license terms of all the following packages: chromedriver, dnspython, docker, docker-compose, firefox-esr, flask, flask_admin, flask_bcrypt, flask_login, Flask-Markdown, flask_mongoengine, geckodriver, gevent, gunicorn, iptables, iptables-persistent, jinja2, jq, libleptonica-dev, libtesseract-dev, matplotlib, netifaces, net-tools, networkx, phantomjs, pymongo, pysocks, pytesseract, python-dateutil, python-magic, pyvirtualdisplay, requests[socks], scapy, selenium, supervisor, tcpdump, termcolor, tesseract, tldextract, unzip, urllib3, validator_collection, werkzeug, wget, xvfb, useragentstring
- Do not deploy without proper configuration
- Setup some security group rules and remove default credentials