colincowie / LeakSiteAnalyticsView external linksLinks
Using plotly to perfom data visualization of ransomware leak site data
☆14Feb 15, 2024Updated 2 years ago
Alternatives and similar repositories for LeakSiteAnalytics
Users that are interested in LeakSiteAnalytics are comparing it to the libraries listed below
Sorting:
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- A tool for studying JavaScript malware.☆15Updated this week
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- All Type Of Tools written in multipule language .☆22Oct 23, 2022Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 9 months ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- Domain Blocklist☆10Aug 21, 2024Updated last year
- ☆13Oct 28, 2022Updated 3 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆190Apr 24, 2025Updated 9 months ago
- ☆12Jun 22, 2022Updated 3 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Place to store .md notes and host other things related to work I do☆15Jun 20, 2023Updated 2 years ago
- ☆14May 20, 2019Updated 6 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- Automatically converts your firefox browser into a hacking tool by installing required plugins.☆12Jun 26, 2017Updated 8 years ago
- On Premise Installer☆14Apr 7, 2021Updated 4 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆10Jan 22, 2025Updated last year
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- ☆14Dec 5, 2014Updated 11 years ago