Concinnity-Risks / RansomCoinPublicLinks
A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.
☆56Updated last year
Alternatives and similar repositories for RansomCoinPublic
Users that are interested in RansomCoinPublic are comparing it to the libraries listed below
Sorting:
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A Darktrace CLI written in Python☆16Updated 5 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- ☆33Updated 5 months ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆15Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- ☆53Updated 4 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆63Updated last month
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- ☆4Updated 2 years ago
- python hash cracker☆52Updated 8 months ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆31Updated this week
- Vulnerability Scanner☆11Updated 10 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆13Updated 3 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- ☆22Updated 4 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 6 years ago