PaulSec / ransomware-tracker
(Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/
☆16Updated 8 years ago
Alternatives and similar repositories for ransomware-tracker:
Users that are interested in ransomware-tracker are comparing it to the libraries listed below
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- ☆26Updated 4 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- Windows login backdoor diagnostic tool☆11Updated 7 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆10Updated 9 years ago
- Automated script to search in SMB protocol for availables pipe names☆22Updated 6 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- CTF Writeups☆18Updated 7 years ago
- Carve shellcode within the memory using restrictive character set☆8Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Gmail Knocker☆21Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Opening CobaltStrike to a wider world☆8Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago