Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: 5 Webapps to Add to Your Security Tool Arsenal
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Risk Management > 5 Webapps to Add to Your Security Tool Arsenal
AnalyticsData ManagementRisk Management

5 Webapps to Add to Your Security Tool Arsenal

BryanHalfpap
BryanHalfpap
3 Min Read
Image
SHARE

ImageWhen you’re mobile, away from the office, or just caught off-guard without your tools and security setup, you need a way to analyze, assess, and interpret emerging threats on-the-fly.  That’s why these 5 free web applications are absolute must-haves for your Favorites Folder.

ImageWhen you’re mobile, away from the office, or just caught off-guard without your tools and security setup, you need a way to analyze, assess, and interpret emerging threats on-the-fly.  That’s why these 5 free web applications are absolute must-haves for your Favorites Folder.

Site: http://urlquery.net/index.php

Purpose: Visits URLs so you don’t have to.

More Read

Data Mining Book Review: Decision Management Systems
Three Implications for the Rise of E-Readers
Ten ways to build a wrong scoring model
Here’s Why Python Is The Top Programming Language For Big Data
Silicon Kelly

About: Scans whatever URL you give it, applies some snort to it, gives you a screenshot, and displays all HTTP transactions that page caused to run.  It allows you to visit a site that might be malicious without actually exposing your web browser to any funk, then tells you if it encounters any exploit kits/snort rules and tells you what those are. 

Site: http://robtex.com/

Purpose: Looking up Domain Name information, A must-have for malware analysis.

About: Lets you know if a given domain name is in a blacklist, tells you all the other records that map to the same IP.  Also has awesome graphs and meta-info about a target domain.

Site: http://onlinedisassembler.com/odaweb/

Purpose: Disassembling binaries

About: This is probably one of the coolest and most-technical.  Forget IDA pro at home? No problem.  Upload your binary and it’ll spit out formatted assembly for you to look at, including sectioned formatting and hex dumps.  It’ll also tell you if it’s known good or known bad (unknown how it’s determining that thought) Sweet.

Site: https://www.virustotal.com/

Purpose: Scans uploaded files or URLs for malware

About: You should already know about this one, but if you don’t, this is a great tool for using when you don’t quite trust a file.  While it doesn’t run the file (which is important since many engines have run-time behavior checking) it will cross-reference the definitions of more than 40 antivirus vendors.  There’s also a voting system and comments section that’ll give you more info if the results are mixed.  Results show up in Google too.

Site: https://malwr.com/

Purpose: Runs your malware, for you

About: Upload malware, and malwr.com will run it inside of the Cuckoo Sandbox, an open-source malware analysis program built for the express purpose of compartmentalizing and analyzing malware samples.  It’ll break everything down from registry changes, network traffic, ASCII strings dump, static and live analysis, the whole enchilada!  Seriously powerful stuff if you know what you’re looking at/for.  This free tool does as much as the $50,000 Fireeye Malware Analysis Tool.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

data mining to find the right poly bag makers
Using Data Analytics to Choose the Best Poly Mailer Bags
Analytics Big Data Exclusive
data science importance of flexibility
Why Flexibility Defines the Future of Data Science
Big Data Exclusive
payment methods
How Data Analytics Is Transforming eCommerce Payments
Business Intelligence
cybersecurity essentials
Cybersecurity Essentials For Customer-Facing Platforms
Exclusive Infographic IT Security

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

data analyst
AnalyticsBest PracticesBig DataBusiness IntelligenceCulture/LeadershipData ManagementITJobsPolicy and Governance

Shortage in Advanced Analytic Skills? Here’s an Indirect Approach

8 Min Read

Big Data Analytics: The Future is Already Here

6 Min Read

The Peril of Analytics (Cartoon)

0 Min Read

Using the Close as a Finance Department Diagnostic

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?