cablej / ransomwhereLinks
The open ransomware payment tracker
☆99Updated last month
Alternatives and similar repositories for ransomwhere
Users that are interested in ransomwhere are comparing it to the libraries listed below
Sorting:
- Website crawler with YARA detection☆89Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- URL fingerprinting made easy☆89Updated last year
- ☆42Updated 6 months ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆62Updated 3 years ago
- ☆96Updated 5 months ago
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆21Updated last month
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆78Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 8 months ago
- Detection Rule License (DRL)☆19Updated 9 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 3 weeks ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆42Updated this week
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated this week
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆35Updated last week
- Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.☆97Updated 5 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Open YARA scan- and search engine☆24Updated 7 months ago
- a common schema for internet-connected service discovery 🔎 📚☆19Updated last month
- Typosquatting tool that supports OSINT investigations, and designed to operate on multilingual target domains.☆21Updated 4 months ago