A repository dedicated to tracking ransomware families based on leaked builders.
☆22Apr 17, 2024Updated 2 years ago
Alternatives and similar repositories for ransomware-descendants
Users that are interested in ransomware-descendants are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆53Aug 22, 2022Updated 3 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- The scrip will help you to find some values info for the user that you need as DFIR☆16Nov 3, 2022Updated 3 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆24Mar 12, 2025Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 11 months ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 3 months ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Mar 31, 2026Updated 2 weeks ago
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- ☆52Oct 10, 2025Updated 6 months ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated 3 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated 2 months ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆118Jan 26, 2022Updated 4 years ago
- CAPE Auto-Hardened Installer☆26Jan 28, 2026Updated 2 months ago
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 2 years ago
- ☆28Mar 31, 2023Updated 3 years ago
- ☆30May 1, 2025Updated 11 months ago
- ☆12Dec 26, 2022Updated 3 years ago
- a common schema for internet-connected service discovery☆23Mar 24, 2026Updated 3 weeks ago
- ☆18Jan 2, 2018Updated 8 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- A ruby web shell that is very ape and very nice☆52Jan 3, 2011Updated 15 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 2 months ago
- GraphSpecter is a tool to audit GraphQL API☆21Oct 6, 2025Updated 6 months ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- Recordization library☆11Apr 8, 2026Updated last week
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆255Oct 29, 2025Updated 5 months ago