A collection of CVEs weaponized by ransomware operators
☆129Oct 13, 2025Updated 6 months ago
Alternatives and similar repositories for Ransomware-Vulnerability-Matrix
Users that are interested in Ransomware-Vulnerability-Matrix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A resource containing all the tools each ransomware gangs uses☆1,355Apr 1, 2026Updated last month
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆119Oct 29, 2024Updated last year
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 11 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆236Aug 20, 2025Updated 8 months ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆404Jan 29, 2026Updated 3 months ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆281Dec 20, 2025Updated 4 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆314Updated this week
- Awesome Security lists for SOC/CERT/CTI☆1,437Updated this week
- PowerShell tools to help defenders hunt smarter, hunt harder.☆479Oct 29, 2025Updated 6 months ago
- The Threat Actor Profile Guide for CTI Analysts☆120Jul 15, 2023Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆288Mar 20, 2025Updated last year
- ☆19May 27, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Presentations from Conferences☆31Sep 14, 2024Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆54Oct 23, 2024Updated last year
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆322Apr 22, 2026Updated last week
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- ☆554Mar 11, 2026Updated last month
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆150Updated this week
- Yet another Ransomware gang tracker☆591Updated this week
- Quick ESXi Log Parser☆31Oct 20, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Cheat sheet to detect and remove linux kernel rootkit☆80Dec 16, 2024Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- ☆297Aug 30, 2025Updated 8 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- IR drill plateform☆23Jul 29, 2025Updated 9 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆794Feb 8, 2026Updated 2 months ago
- yara detection rules for hunting with the threathunting-keywords project☆161May 11, 2025Updated 11 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆163Apr 28, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- Extract the Procedures (TTP) from CTI reports☆18Dec 13, 2025Updated 4 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Jan 29, 2024Updated 2 years ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Mar 31, 2026Updated last month
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆81Apr 12, 2026Updated 3 weeks ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆89Mar 11, 2026Updated last month
- a tiny program to consume from ETW providers for research☆56Jan 4, 2025Updated last year