A repository dedicated to tracking ransomware families based on leaked builders.
☆22Apr 17, 2024Updated last year
Alternatives and similar repositories for ransomware-descendants
Users that are interested in ransomware-descendants are comparing it to the libraries listed below
Sorting:
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆52Aug 22, 2022Updated 3 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- The scrip will help you to find some values info for the user that you need as DFIR☆16Nov 3, 2022Updated 3 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Feb 3, 2024Updated 2 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- a common schema for internet-connected service discovery 🔎 📚☆23Jan 29, 2026Updated last month
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- ☆51Oct 10, 2025Updated 5 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated last month
- 📚A curated list of product security resources.☆23Jun 11, 2025Updated 8 months ago
- ☆12Jul 29, 2019Updated 6 years ago
- ☆27May 1, 2023Updated 2 years ago
- ☆18Dec 23, 2024Updated last year
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 2 years ago
- Automatically update IoC for lucky visitor scam☆26Apr 9, 2025Updated 11 months ago
- ☆24Mar 12, 2025Updated 11 months ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated 2 months ago
- ☆24Feb 7, 2025Updated last year
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- ☆36Aug 23, 2022Updated 3 years ago
- This script searches messages containing specified search terms in Telegram channels the user is a member of.☆62Jul 11, 2023Updated 2 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- ☆30May 1, 2025Updated 10 months ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Jun 29, 2023Updated 2 years ago
- ☆28Mar 31, 2023Updated 2 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- Repository for archiving Cobalt Strike configuration☆36Feb 28, 2026Updated last week
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆62Oct 28, 2023Updated 2 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆41Apr 7, 2025Updated 11 months ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Aug 23, 2025Updated 6 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago