โ543Sep 9, 2025Updated 6 months ago
Alternatives and similar repositories for Ransomchats
Users that are interested in Ransomchats are comparing it to the libraries listed below
Sorting:
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabzโ404Feb 25, 2026Updated last week
- the transparent ransomware claim tracker ๐ฅท๐ผ๐ง ๐ฅ๏ธโ1,091Updated this week
- Yet another Ransomware gang trackerโ563Feb 24, 2026Updated last week
- Map tracking ransomware, by OCD World Watch teamโ485Feb 20, 2026Updated 2 weeks ago
- Building a consolidated RSS feed for articles about cyberattacksโ74Updated this week
- A resource containing all the tools each ransomware gangs usesโ1,332Dec 24, 2025Updated 2 months ago
- Cyber Underground General Intelligence Requirementsโ98Feb 2, 2024Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark webโ6,636Updated this week
- ๐ดโโ ๏ธ๐ฐ Another Ransomware gang trackerโ303Jan 19, 2026Updated last month
- Awesome list of keywords and artifacts for Threat Hunting sessionsโ641Aug 4, 2025Updated 7 months ago
- Hayabusa (้ผ) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.โ3,051Feb 24, 2026Updated last week
- A collection of CVEs weaponized by ransomware operatorsโ129Oct 13, 2025Updated 4 months ago
- Live Feed of C2 servers, tools, and botnetsโ751Mar 2, 2026Updated last week
- A repository dedicated to tracking ransomware families based on leaked builders.โ22Apr 17, 2024Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligenceโ706Apr 21, 2025Updated 10 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.โ1,931Jan 20, 2026Updated last month
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends eโฆโ26Sep 25, 2023Updated 2 years ago
- Automatically created C2 Feedsโ667Updated this week
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accountsโ1,371Oct 22, 2025Updated 4 months ago
- Interesting APT Report Collection And Some Special IOCsโ2,929Updated this week
- This repository contains indicators of compromise (IOCs) of our various investigations.โ313Nov 4, 2025Updated 4 months ago
- This map lists the essential techniques to bypass anti-virus and EDRโ3,166Mar 28, 2025Updated 11 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windowsโฆโ2,056Dec 11, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITREโฆโ1,206Dec 29, 2025Updated 2 months ago
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft Eโฆโ1,242Feb 27, 2026Updated last week
- Send phishing messages and attachments to Microsoft Teams usersโ1,105Jun 19, 2024Updated last year
- โ108Nov 7, 2024Updated last year
- Ransomware groups postsโ44Updated this week
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)โ67Oct 1, 2022Updated 3 years ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups โฆโ397Jan 29, 2026Updated last month
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direcโฆโ443Oct 1, 2025Updated 5 months ago
- โ301Oct 29, 2024Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both โฆโ42Jul 18, 2024Updated last year
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.โ500Jan 23, 2023Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methodsโ1,470Aug 18, 2023Updated 2 years ago
- onedrive user enumeration - pentest tool to enumerate valid o365 usersโ745Jul 29, 2025Updated 7 months ago
- Monitor your target continuously for new subdomains!โ25Mar 18, 2023Updated 2 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATโฆโ1,208Feb 20, 2026Updated 2 weeks ago
- Awesome Security lists for SOC/CERT/CTIโ1,271Updated this week