bbbbbrie / awesome-ransomwareLinks
Curated list of ransomware-related resources; awesome style.
☆25Updated 11 months ago
Alternatives and similar repositories for awesome-ransomware
Users that are interested in awesome-ransomware are comparing it to the libraries listed below
Sorting:
- Ransomware groups posts☆43Updated this week
- Hashes of infamous malware☆26Updated 2 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- Cybercrime forums for Cyber Threat Intelligence purpose☆93Updated 6 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Updated 2 years ago
- URL fingerprinting made easy☆89Updated last year
- Virus Total Free - IOC parser and report generator☆24Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- ☆27Updated 4 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆21Updated 4 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆34Updated 4 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆56Updated 2 years ago
- Maltego transformation for TON investigations☆24Updated last year
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Updated 2 months ago
- ☆148Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Updated 2 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆54Updated 2 weeks ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Updated last year
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Updated 4 years ago
- Collection of videos of Raids on Cybercriminals☆21Updated 9 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆14Updated 2 weeks ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆28Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- Yara scan Phishing Kit's Zip archive(s)☆62Updated 6 months ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆104Updated 3 years ago
- Maltego Transforms for WhatsMyName☆67Updated 2 years ago