bbbbbrie / awesome-ransomwareLinks
Curated list of ransomware-related resources; awesome style.
☆20Updated 8 months ago
Alternatives and similar repositories for awesome-ransomware
Users that are interested in awesome-ransomware are comparing it to the libraries listed below
Sorting:
- A database for storing, querying and doing stats on credential leaks☆40Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- ☆28Updated 4 years ago
- Cybercrime forums for Cyber Threat Intelligence purpose☆86Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Ransomware groups posts☆42Updated this week
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆51Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆12Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Curated list of enterprise ransomware defense resources☆14Updated 3 years ago
- A tool designed to analyse email headers☆37Updated 2 years ago
- URL fingerprinting made easy☆89Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆91Updated last year
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.☆27Updated 2 years ago
- ☆53Updated 4 years ago
- Ransomware for demonstration☆18Updated 2 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆53Updated 5 months ago
- Nexus of Android banking Trojans☆15Updated last year
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- GhostSec Scam Detection Tool☆15Updated 4 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- web application pentesting tools for docker☆18Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Updated 2 years ago