A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.
☆56Oct 17, 2023Updated 2 years ago
Alternatives and similar repositories for RansomCoinPublic
Users that are interested in RansomCoinPublic are comparing it to the libraries listed below
Sorting:
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- Graphoscope is a solution to access multiple independent data sources from a common UI and show data relations as a graph☆41Sep 25, 2025Updated 5 months ago
- The paste analyzer☆27Mar 19, 2021Updated 5 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Mar 2, 2026Updated 2 weeks ago
- API public documentation☆10Dec 17, 2018Updated 7 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated last month
- ☆29Jul 4, 2020Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- A database for storing, querying and doing stats on credential leaks☆40May 23, 2023Updated 2 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- HashCobra Hash Cracking tool.☆122Dec 1, 2020Updated 5 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- Simple Backdoor Manager with Python (based on weevely)☆96Feb 27, 2025Updated last year
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- S4A main repository. SaltStack states, install script and build scripts☆27Mar 9, 2026Updated last week
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 10 months ago
- A Python 2.x library for asynchronous tasks☆13May 8, 2019Updated 6 years ago
- Rust implementation of the DCSO Bloom filter☆29Jul 15, 2025Updated 8 months ago
- A python based application that uses external tools to decompile Android APK’s.☆23Aug 23, 2020Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago