StrangerealIntel / Shadow-Pulse
information about ransomware groups (Ransomware Analysis Notes)
☆35Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for Shadow-Pulse
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- ☆36Updated 7 months ago
- ☆29Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- ☆76Updated this week
- Hive v5 file decryption algorithm☆34Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- An Adaptive Misuse Detection System☆29Updated 2 weeks ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 5 months ago
- Configuration Extractors for Malware☆54Updated last month
- Yara Rules for Modern Malware☆67Updated 8 months ago
- ☆20Updated 11 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆30Updated 5 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆29Updated last week
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆42Updated this week
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆41Updated this week
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated 3 weeks ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆39Updated 4 months ago
- ☆27Updated 3 months ago
- CIS Benchmark testing of Windows SIEM configuration☆43Updated last year
- ☆16Updated last year
- C2 Active Scanner☆49Updated 5 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆25Updated last year
- ☆28Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year