CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd
☆13Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for ransomwatch-cli
Users that are interested in ransomwatch-cli are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 9 months ago
- Ransomware groups posts☆44Mar 3, 2026Updated 3 weeks ago
- Using plotly to perfom data visualization of ransomware leak site data☆14Feb 15, 2024Updated 2 years ago
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- Random things for my own reference☆22Aug 22, 2022Updated 3 years ago
- Cowrie SSH/Telnet Honeypot☆12Sep 3, 2018Updated 7 years ago
- GTK theme based on original Adwaita, default theme of the GNOME desktop☆12Jun 21, 2023Updated 2 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- ☆14Sep 8, 2024Updated last year
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Jun 29, 2021Updated 4 years ago
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Sep 30, 2019Updated 6 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆59Mar 4, 2023Updated 3 years ago
- ☆21Apr 19, 2024Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆118Oct 22, 2021Updated 4 years ago
- Curated list of ransomware-related resources; awesome style.☆32Jan 17, 2025Updated last year
- A Python script to parse Fortinet products serial numbers, and detect the associated model and revision.☆19Oct 1, 2023Updated 2 years ago
- All credits to Matt Walker (Author of "CEH Certified Ethical Hacker All-in-One Exam Guide" ISBN 1264269943)☆11Feb 5, 2022Updated 4 years ago
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 10 months ago
- Automatically transfers funds from Paypal account into you bank account☆11Jul 20, 2020Updated 5 years ago
- PowerShell module containing commands to easily interact with the Cybereason API.☆16Jan 4, 2026Updated 2 months ago
- A database for storing, querying and doing stats on credential leaks☆40May 23, 2023Updated 2 years ago
- Meeting notes☆14Apr 5, 2016Updated 9 years ago
- minimalist bullet journaling program: a markdown renderer with wiki-link support☆33Mar 15, 2026Updated last week
- Work in progress porting my blog software to Common Lisp☆10Sep 18, 2019Updated 6 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 5 months ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 9 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Jul 7, 2023Updated 2 years ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆21Mar 22, 2025Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Tracking APT IOCs☆25Nov 16, 2020Updated 5 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Personal template for most python projects.☆18Mar 14, 2026Updated last week
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Automated hacking tool used to find leaked databases with 97.1% accuracy to grab emails along with their password from recent Pastebin up…☆37Dec 12, 2023Updated 2 years ago