A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.
☆56Oct 17, 2023Updated 2 years ago
Alternatives and similar repositories for RansomCoinPublic
Users that are interested in RansomCoinPublic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Apr 10, 2024Updated 2 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆37Feb 11, 2020Updated 6 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Graphoscope is a solution to access multiple independent data sources from a common UI and show data relations as a graph☆40Sep 25, 2025Updated 7 months ago
- The paste analyzer☆27Mar 19, 2021Updated 5 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆24Mar 2, 2026Updated last month
- API public documentation☆10Dec 17, 2018Updated 7 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated 2 months ago
- ☆29Jul 4, 2020Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- A database for storing, querying and doing stats on credential leaks☆39May 23, 2023Updated 2 years ago
- Real Time Threat Monitoring Tool☆115Nov 16, 2022Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 9 months ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- Simple Backdoor Manager with Python (based on weevely)☆96Feb 27, 2025Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- S4A main repository. SaltStack states, install script and build scripts☆27Mar 18, 2026Updated last month
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Python 2.x library for asynchronous tasks☆13May 8, 2019Updated 6 years ago
- Rust implementation of the DCSO Bloom filter☆29Jul 15, 2025Updated 9 months ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- Source code of the Rensenware ransomware in .NET☆20Jul 24, 2021Updated 4 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 6 years ago
- HashCobra Hash Cracking tool.☆123Dec 1, 2020Updated 5 years ago