An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz
β415Apr 6, 2026Updated 3 weeks ago
Alternatives and similar repositories for ransomware_notes
Users that are interested in ransomware_notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β553Mar 11, 2026Updated last month
- the transparent ransomware claim tracker π₯·πΌπ§ π₯οΈβ1,103Mar 3, 2026Updated last month
- Map tracking ransomware, by OCD World Watch teamβ487Feb 20, 2026Updated 2 months ago
- Yet another Ransomware gang trackerβ591Updated this week
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reportsβ79Jan 26, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- π΄ββ οΈπ° Another Ransomware gang trackerβ322Updated this week
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups β¦β404Jan 29, 2026Updated 3 months ago
- β24Apr 10, 2024Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark webβ6,824Updated this week
- Automatically created C2 Feedsβ677Updated this week
- IOCs collected during day-to-day activitiesβ129Apr 17, 2026Updated 2 weeks ago
- Live Feed of C2 servers, tools, and botnetsβ771Apr 13, 2026Updated 2 weeks ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchersβ793Feb 8, 2026Updated 2 months ago
- A resource containing all the tools each ransomware gangs usesβ1,355Apr 1, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends eβ¦β26Sep 25, 2023Updated 2 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessionsβ654Aug 4, 2025Updated 8 months ago
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaignβ71Jul 19, 2023Updated 2 years ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence teamβ98Mar 17, 2026Updated last month
- Purpleteam scripts simulation & Detection - trigger events for SOC detectionsβ198Dec 20, 2024Updated last year
- Building a consolidated RSS feed for articles about cyberattacksβ74Updated this week
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)β19Jun 2, 2021Updated 4 years ago
- β391Updated this week
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligenceβ720Apr 25, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Interesting APT Report Collection And Some Special IOCsβ2,974Apr 23, 2026Updated last week
- Awesome Security lists for SOC/CERT/CTIβ1,437Updated this week
- Collection of rules created using YARA-Signator over Malpediaβ143Jan 6, 2026Updated 3 months ago
- β35Jan 13, 2026Updated 3 months ago
- A ProcessMonitor visualization application written in rust.β185Aug 6, 2023Updated 2 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Mβ¦β3,768Apr 16, 2026Updated 2 weeks ago
- The Threat Actor Profile Guide for CTI Analystsβ120Jul 15, 2023Updated 2 years ago
- β66Jan 27, 2023Updated 3 years ago
- Repository of Yara Rulesβ143Updated this week
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Open Source Platform for storing, organizing, and searching documents related to cyber threatsβ170Nov 10, 2023Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.β205Jul 3, 2024Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.β62Feb 8, 2022Updated 4 years ago
- β23Dec 15, 2022Updated 3 years ago
- Curated list of ransomware-related resources; awesome style.β33Jan 17, 2025Updated last year
- β509Oct 7, 2024Updated last year
- Collection of videos of Raids on Cybercriminalsβ22Mar 19, 2025Updated last year