AyoobAli / ransomwatch-cli
CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ransomwatch-cli
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 4 months ago
- Sniffing out well-known threat groups☆28Updated 3 months ago
- A MITRE ATT&CK Lookup Tool☆44Updated 6 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 3 weeks ago
- ☆26Updated this week
- Linux Baseline and Forensic Triage Tool - BETA☆50Updated 2 years ago
- A home for detection content developed by the delivr.to team☆59Updated last week
- Cyber Underground General Intelligence Requirements☆89Updated 9 months ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆16Updated 3 years ago
- Logbook for Digital Forensics and Incident Response☆49Updated 4 months ago
- C2 Active Scanner☆49Updated 5 months ago
- ☆19Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Remote access and Antivirus Logging Database☆41Updated 6 months ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆45Updated 7 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 2 months ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated 11 months ago
- This Repository gives the best and possible strategies against hunting the ransomware☆24Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆42Updated this week
- Can you pay the ransom in your country?☆14Updated 11 months ago
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- Virus Total Free - IOC parser and report generator☆22Updated last year
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆59Updated 3 weeks ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆25Updated last year
- my MSTICpy practice and custom tools repository☆11Updated 2 weeks ago