The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports is available for download. This reports covers the latest activity from APT groups, as well as new information on ransomware and phishing attacks. We recommend that all Brandefense followers download this repor…
☆23Oct 1, 2025Updated 6 months ago
Alternatives and similar repositories for Threat-Intelligence-Researches
Users that are interested in Threat-Intelligence-Researches are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Aug 8, 2024Updated last year
- ⚡ A subdomain enumeration tool leveraging diverse techniques, designed for advanced pentesting operations☆50Updated this week
- ☆11Dec 8, 2022Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Ransomware Decryptors☆36Apr 28, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- List of Awesome Red Teaming Resources☆13Sep 2, 2021Updated 4 years ago
- ☆21Sep 17, 2024Updated last year
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Jul 19, 2023Updated 2 years ago
- DomainsProject.org HTTP worker☆25Dec 11, 2022Updated 3 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Mar 16, 2022Updated 4 years ago
- Calculate and Track SSL and Domain expiration dates☆16Mar 31, 2020Updated 6 years ago
- Vaccinating against WannaCry ransomware: a free tool by Minerva's research team☆24May 15, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- Google's list of Certificate Transparency logs as a rust crate for use with sct.rs☆14Feb 17, 2023Updated 3 years ago
- Source code of the Rensenware ransomware in .NET☆20Jul 24, 2021Updated 4 years ago
- the source code that powered gitlive.net☆11Feb 12, 2016Updated 10 years ago
- Passivedns monitor implementation in Rust.☆12Apr 21, 2016Updated 10 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Open YARA scan- and search engine☆27Feb 23, 2025Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A toolkit for CTFs☆14Mar 19, 2026Updated last month
- s3 as a datastore: A way to use S3 as a key-value datastore instead of a real datastore. can be read as s3aadatastore☆14Mar 16, 2023Updated 3 years ago
- Implementations of the GEA-1 and GEA-2 (GPRS Encryption Algorithm) stream ciphers in C, Python and Rust.☆17Mar 29, 2026Updated last month
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆20Jan 3, 2023Updated 3 years ago
- All Type Of Tools written in multipule language .☆22Oct 23, 2022Updated 3 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆31Jul 6, 2017Updated 8 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆34Jun 29, 2021Updated 4 years ago
- metawarc: a command-line tool for metadata extraction from files from WARC (Web ARChive)☆34Oct 27, 2025Updated 6 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆44Sep 25, 2025Updated 7 months ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- Network scan tool for host and service discovery. Written in Rust.☆22Feb 17, 2026Updated 2 months ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Oct 17, 2023Updated 2 years ago