Purple Strike

“The tech stack I rely on in my daily workflow”

🆕 Latest Resources

💀 Retired Resources

📂 Browse by Category

🔍 Attack Surface Management

Purpose: Identify, monitor, and reduce external digital exposure.

🧰 Multi-Tool & Aggregation Platforms

Purpose: Combine multiple security tools in one interface.

🧪 Sandboxing

Purpose: Safely execute and observe suspicious files.

📄 Forensics & Incident Response

Purpose: Collect and analyze digital evidence for investigations.

📡 Threat Intelligence Platforms (TIPs)

Purpose: Aggregate and manage threat intelligence feeds.

MISP
OpenCTI

📖 Geo Intelligence

Purpose: Track, map and analyze location-based cyber activities.

🕵️ People Search & Identity OSINT

Purpose: Investigate identities using open-source data.

🌑 Dark Web Monitoring

Purpose: Detect leaked data and threats on dark web sources.

🖼️ Image Intelligence (IMGlNT)

Purpose: Identify metadata, hidden data, or visual clues in images.

🌐 Domain & IP Intelligence

Purpose: Investigate domains and IPs for ownership and suspicious activity.

📧 Email Intelligence

Purpose: Identify malicious, spoofed, or compromised email accounts.

🔗 URL Intelligence

Purpose: Detect phishing, malware, and malicious links in real time.

📦 Static Analysis Tools

Purpose: Examine files without executing them and Identify malicious code through file inspection.

⚡ Dynamic Analysis Tools

Purpose: Analyze behavior by running files in a controlled environment and Detect threats by observing runtime actions.

⭐ Miscellaneous

Purpose: Extra utilities for niche or specialized security tasks.

Scroll to Top