The open ransomware payment tracker
☆102Aug 29, 2025Updated 6 months ago
Alternatives and similar repositories for ransomwhere
Users that are interested in ransomwhere are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆28Feb 7, 2021Updated 5 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆24Dec 5, 2025Updated 3 months ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Vulnerability disclosure policies in the US Government's executive branch☆39Mar 28, 2023Updated 2 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Crawler that retrieves commoncrawl's crawled hosts and their corresponding IPs☆21Sep 1, 2025Updated 6 months ago
- Digital Forensics XML packages in Python☆18Jan 20, 2026Updated 2 months ago
- Ransomware groups posts☆44Mar 3, 2026Updated 3 weeks ago
- ☆35Oct 29, 2021Updated 4 years ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,094Mar 3, 2026Updated 3 weeks ago
- A database for storing, querying and doing stats on credential leaks☆40May 23, 2023Updated 2 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 11 months ago
- a scaling framework for tor traffic balancing 🧦 🧅 ⚖️☆14Mar 17, 2026Updated last week
- A UserScript to detect GPT generated comments on Hackernews.☆13Dec 10, 2022Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- A Python library for defining rule-based overrides on messy data☆18Nov 24, 2025Updated 4 months ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆97Jan 8, 2026Updated 2 months ago
- ☆20Feb 6, 2024Updated 2 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆35Apr 16, 2021Updated 4 years ago
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- Yet another Ransomware gang tracker☆565Mar 12, 2026Updated last week
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆49Jan 26, 2026Updated last month
- ☆53Aug 19, 2025Updated 7 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆35Oct 21, 2025Updated 5 months ago
- Apple wireless research and tools☆19Jul 19, 2020Updated 5 years ago
- ☆13Mar 12, 2026Updated last week
- Lists of not-suitable-for-work words as YARA rules☆29Feb 2, 2026Updated last month
- External monitoring for organization assets☆421Jun 5, 2024Updated last year
- ☆16Aug 19, 2021Updated 4 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago