cablej / ransomwhereLinks
The open ransomware payment tracker
☆98Updated 2 weeks ago
Alternatives and similar repositories for ransomwhere
Users that are interested in ransomwhere are comparing it to the libraries listed below
Sorting:
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- URL fingerprinting made easy☆89Updated last year
- Website crawler with YARA detection☆88Updated 2 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆20Updated last month
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated 2 years ago
- ☆42Updated 5 months ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Yara scan Phishing Kit's Zip archive(s)☆59Updated 2 months ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated last week
- Dependency Combobulator☆93Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 9 months ago
- Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.☆96Updated 4 months ago
- A phishing kit collector for scavengers☆218Updated 3 weeks ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 9 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆40Updated 3 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 4 months ago
- Hashes of infamous malware☆26Updated 2 years ago
- ☆96Updated 4 months ago