Threat Analysis

Platforms that provide sandboxing and dynamic analysis capabilities to examine threat vectors observed in the wild.

3 listed tools Last update on 2025-06-12

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

Hybrid Analysis 

Commercial   Free            

Malware analysis service powered by CrowdStrike, offering in-depth behavioral reports and threat intelligence for submitted files and URLs

urlscan.io 

Commercial   Free        

Web sandbox and threat intelligence platform for scanning, analyzing, and archiving website behavior and malicious indicators

VirusTotal 

Commercial   Free            

Free online service aggregating multiple antivirus engines and tools to analyze files and URLs for malware, facilitating threat detection and intelligence sharing