The open ransomware payment tracker
☆102Aug 29, 2025Updated 6 months ago
Alternatives and similar repositories for ransomwhere
Users that are interested in ransomwhere are comparing it to the libraries listed below
Sorting:
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- Digital Forensics XML packages in Python☆18Jan 20, 2026Updated last month
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Apr 1, 2024Updated last year
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- A UserScript to detect GPT generated comments on Hackernews.☆13Dec 10, 2022Updated 3 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆97Jan 8, 2026Updated last month
- Ransomware groups posts☆44Updated this week
- ☆35Oct 29, 2021Updated 4 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 2 years ago
- Malicious DLL Generator in Py3☆27Jul 8, 2020Updated 5 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 10 months ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- Vulnerability disclosure policies in the US Government's executive branch☆39Mar 28, 2023Updated 2 years ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,091Jun 17, 2025Updated 8 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- A database for storing, querying and doing stats on credential leaks☆39May 23, 2023Updated 2 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Jul 9, 2025Updated 7 months ago
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- scavenger is a ruby brute forcing script that uses Typhoeus gem to enable parallelization and sends multiple http requests with various p…☆12Aug 25, 2021Updated 4 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Secp256k1 blind signature certification authority boilerplate☆11Apr 23, 2024Updated last year
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- A Python library for defining rule-based overrides on messy data☆18Nov 24, 2025Updated 3 months ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- ☆13Feb 23, 2026Updated last week