Using plotly to perfom data visualization of ransomware leak site data
☆14Feb 15, 2024Updated 2 years ago
Alternatives and similar repositories for LeakSiteAnalytics
Users that are interested in LeakSiteAnalytics are comparing it to the libraries listed below
Sorting:
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- All Type Of Tools written in multipule language .☆22Oct 23, 2022Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 10 months ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- Domain Blocklist☆10Aug 21, 2024Updated last year
- ☆12Oct 28, 2022Updated 3 years ago
- Lists of Dynamic DNS Domains/FQDNs as well as lists of services/providers that offer free dynamic dns domains.☆13Nov 2, 2021Updated 4 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- XDP Based Lightweight and Fast Firewall☆60Feb 23, 2026Updated 2 weeks ago
- ☆10Oct 22, 2017Updated 8 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- This iOS 9 app lets you use your own filter list in Safari.☆11Sep 5, 2015Updated 10 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Cookiecutter template for StackStorm pack repositories☆11Jun 9, 2022Updated 3 years ago
- import library.zip in memory, with the interface the same as zipimport.☆10Jan 10, 2026Updated 2 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- A repo that contains a recursive dump from the ROOT key of every Windows Registry hive (using KAPE) from a vanilla (clean) install of eve…☆53Oct 29, 2025Updated 4 months ago
- ☆20Jan 25, 2019Updated 7 years ago
- 社工库信息(csv,excel,sql)导入es☆11Mar 1, 2017Updated 9 years ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- Post the latest post from your RSS Feed to your LinkedIn Profile☆12Jan 28, 2026Updated last month
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago