Concinnity-Risks / RansomCoinPublicLinks
A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.
☆56Updated last year
Alternatives and similar repositories for RansomCoinPublic
Users that are interested in RansomCoinPublic are comparing it to the libraries listed below
Sorting:
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆26Updated 6 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 4 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Updated 6 years ago
- ☆53Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆15Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Snort_rules detection bad actors.☆28Updated 11 months ago
- A Darktrace CLI written in Python☆16Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆31Updated 3 weeks ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Updated 8 years ago
- Short little AV Test to check Detection Rates☆22Updated 4 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- Custom Maltego transforms☆68Updated 10 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73Updated 2 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- bap - http Basic Authentication honeyPot☆50Updated 10 years ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Neto | A tool to analyse browser extensions☆88Updated 4 years ago
- an awesome list of honeypot resources☆10Updated 8 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Updated 6 years ago