cablej / ransomwhereLinks
The open ransomware payment tracker
☆101Updated 3 months ago
Alternatives and similar repositories for ransomwhere
Users that are interested in ransomwhere are comparing it to the libraries listed below
Sorting:
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Website crawler with YARA detection☆90Updated 2 years ago
- ☆96Updated 7 months ago
- URL fingerprinting made easy☆90Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 10 months ago
- ☆67Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Updated 2 years ago
- ☆42Updated 8 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 9 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 months ago
- Open YARA scan- and search engine☆25Updated 9 months ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆21Updated 8 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆62Updated 4 years ago
- a common schema for internet-connected service discovery 🔎 📚☆22Updated 3 weeks ago
- ☆35Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 11 months ago
- Web Application for domain name monitoring / alerting☆65Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Updated 2 years ago
- ☆29Updated 10 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year