CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd
☆13Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for ransomwatch-cli
Users that are interested in ransomwatch-cli are comparing it to the libraries listed below
Sorting:
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 9 months ago
- Using plotly to perfom data visualization of ransomware leak site data☆14Feb 15, 2024Updated 2 years ago
- A Python script to parse Fortinet products serial numbers, and detect the associated model and revision.☆19Oct 1, 2023Updated 2 years ago
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- Ransomware groups posts☆44Updated this week
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆59Mar 4, 2023Updated 3 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 10 months ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆35Feb 17, 2021Updated 5 years ago
- This repository is for code and documentation for Badge Engine, a Digital Promise technology☆18Dec 22, 2025Updated 2 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Jul 7, 2023Updated 2 years ago
- A database for storing, querying and doing stats on credential leaks☆39May 23, 2023Updated 2 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- ☆12Oct 28, 2022Updated 3 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 9 months ago
- ☆20Jan 25, 2019Updated 7 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- ☆18Jan 26, 2026Updated last month
- Display latest Cyber Security News within your PiMirror☆10Feb 23, 2021Updated 5 years ago
- import library.zip in memory, with the interface the same as zipimport.☆10Jan 10, 2026Updated last month
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 2 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- ☆11Dec 28, 2025Updated 2 months ago
- ☆13Jul 24, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Scan systems and docker images for potential spring4shell vulnerabilities. Will detect in-depth (layered archives jar/zip/tar/war and sca…☆11Apr 2, 2022Updated 3 years ago
- Post the latest post from your RSS Feed to your LinkedIn Profile☆12Jan 28, 2026Updated last month
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Visit https://github.com/ombre-project/ombre☆12Jul 5, 2019Updated 6 years ago
- brewpkg☆17Sep 30, 2025Updated 5 months ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Automatically converts your firefox browser into a hacking tool by installing required plugins.☆12Jun 26, 2017Updated 8 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago