cablej / ransomwhereLinks
The open ransomware payment tracker
☆94Updated 7 months ago
Alternatives and similar repositories for ransomwhere
Users that are interested in ransomwhere are comparing it to the libraries listed below
Sorting:
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆41Updated last week
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Website crawler with YARA detection☆88Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated 2 months ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Can you pay the ransom in your country?☆14Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆142Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆66Updated 3 years ago
- ☆66Updated 2 years ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆182Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- ☆96Updated last month
- A CALDERA plugin☆26Updated 10 months ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 4 months ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Valhalla API Client☆70Updated 2 years ago
- Website for ail-typo-squatting library☆59Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated last month
- URL fingerprinting made easy☆86Updated last year
- ☆28Updated 4 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 6 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago