EmissarySpider / ransomware-descendantsView external linksLinks
A repository dedicated to tracking ransomware families based on leaked builders.
☆22Apr 17, 2024Updated last year
Alternatives and similar repositories for ransomware-descendants
Users that are interested in ransomware-descendants are comparing it to the libraries listed below
Sorting:
- Packet Analysis on Steroids☆12Oct 20, 2022Updated 3 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆52Aug 22, 2022Updated 3 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- The scrip will help you to find some values info for the user that you need as DFIR☆16Nov 3, 2022Updated 3 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Feb 3, 2024Updated 2 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- a common schema for internet-connected service discovery 🔎 📚☆23Jan 29, 2026Updated 2 weeks ago
- ☆49Oct 10, 2025Updated 4 months ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Cyber Threat Intelligence☆74Dec 7, 2025Updated 2 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 2 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated last month
- ☆18Dec 23, 2024Updated last year
- 📚A curated list of product security resources.☆22Jun 11, 2025Updated 8 months ago
- ☆12Jul 29, 2019Updated 6 years ago
- ☆27May 1, 2023Updated 2 years ago
- ☆24Mar 12, 2025Updated 11 months ago
- Automatically update IoC for lucky visitor scam☆26Apr 9, 2025Updated 10 months ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated last month
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated 2 weeks ago
- ☆34Aug 23, 2022Updated 3 years ago
- ☆24Feb 7, 2025Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- This script searches messages containing specified search terms in Telegram channels the user is a member of.☆62Jul 11, 2023Updated 2 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- Garudaastra Tool is based on python3 to find cameras around the world☆28Jun 29, 2023Updated 2 years ago
- ☆30May 1, 2025Updated 9 months ago
- Repository for archiving Cobalt Strike configuration☆36Feb 5, 2026Updated last week
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆62Oct 28, 2023Updated 2 years ago