JPCERTCC / Lucky-Visitor-Scam-IoCView external linksLinks
Automatically update IoC for lucky visitor scam
☆26Apr 9, 2025Updated 10 months ago
Alternatives and similar repositories for Lucky-Visitor-Scam-IoC
Users that are interested in Lucky-Visitor-Scam-IoC are comparing it to the libraries listed below
Sorting:
- Surface Analysis System on Cloud☆19Dec 21, 2023Updated 2 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago
- Memory Forensic System on Cloud☆92Dec 21, 2023Updated 2 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 11 years ago
- ☆18Mar 26, 2024Updated last year
- Vulnerable demo application for the race condition☆22Apr 27, 2021Updated 4 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- ☆10Updated this week
- Hive v5 file decryption algorithm☆34Nov 28, 2022Updated 3 years ago
- Collection of ProjectDiscovery wallpapers☆34Oct 31, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- Linux下的设备管理器(支持硬件信息检测、设备驱动安装和硬件性能测试)☆10Oct 22, 2013Updated 12 years ago
- Domain Blocklist☆10Aug 21, 2024Updated last year
- An ebpf based agent for monitoring security relevant events on Linux systems.☆34Nov 3, 2023Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆46Jan 22, 2025Updated last year
- ☆10Jul 8, 2024Updated last year
- Mindmap for OWASP Top 10 LLM Application and Relationship between them☆13Dec 11, 2024Updated last year
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 2 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- In accordance with survey reports, the growth of online business worldwide is significantly faster and higher in comparison with traditio…☆13Jul 30, 2023Updated 2 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- Detection rule validation☆40Oct 25, 2023Updated 2 years ago
- ☆13Apr 2, 2023Updated 2 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- recursos en español para profes con conciencia digital☆11Oct 14, 2018Updated 7 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- A Streamlit-based chatbot application using Gemini models for NLP. Features include light/dark mode toggle, model selection (Gemini 1.5 F…☆10May 23, 2024Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- All my POC related to malware development☆14May 13, 2024Updated last year
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- ☆10Nov 15, 2025Updated 3 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Ransomware Detection using Machine Learning☆11Feb 10, 2023Updated 3 years ago