cablej / ransomwhereLinks
The open ransomware payment tracker
☆102Updated 4 months ago
Alternatives and similar repositories for ransomwhere
Users that are interested in ransomwhere are comparing it to the libraries listed below
Sorting:
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- ☆96Updated 8 months ago
- ☆42Updated 9 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 3 months ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Updated last year
- Website crawler with YARA detection☆90Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- URL fingerprinting made easy☆90Updated last year
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 4 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆77Updated last month
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆120Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Updated 2 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 3 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13Updated 5 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆41Updated this week
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated 9 months ago
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆20Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 11 months ago
- Website for ail-typo-squatting library☆70Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- A CALDERA plugin☆26Updated 3 months ago
- ☆44Updated 6 months ago