cablej / ransomwhere
The open ransomware payment tracker
☆91Updated 2 months ago
Alternatives and similar repositories for ransomwhere:
Users that are interested in ransomwhere are comparing it to the libraries listed below
- Website crawler with YARA detection☆88Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆109Updated 3 years ago
- Cyber Underground General Intelligence Requirements☆89Updated 11 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆168Updated 2 months ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆38Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆84Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)☆133Updated 8 months ago
- Collection of videos of Raids on Cybercriminals☆18Updated 3 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆55Updated last month
- Because phishtank was taken.. explore phishing kits in a contained environment!☆45Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆35Updated 3 weeks ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆66Updated 2 months ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆107Updated 2 years ago
- Vulnerability disclosure policies in the US Government's executive branch☆37Updated last year
- ☆42Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆74Updated last year
- A CALDERA plugin☆25Updated 5 months ago
- BlackBerry Threat Research & Intelligence☆96Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- CVE.ICU code.☆38Updated this week
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆54Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆102Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated 2 months ago
- Yet another way to find where to report an abuse☆31Updated last month
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆18Updated this week