A visualized overview of the Initial Access Broker (IAB) cybercrime landscape
☆118Oct 22, 2021Updated 4 years ago
Alternatives and similar repositories for Initial-Access-Broker-Landscape
Users that are interested in Initial-Access-Broker-Landscape are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Threat Actor Profile Guide for CTI Analysts☆117Jul 15, 2023Updated 2 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆15May 30, 2018Updated 7 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Dec 13, 2023Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Oct 25, 2021Updated 4 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆17Sep 10, 2021Updated 4 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Jun 29, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆117Oct 29, 2024Updated last year
- Ransomware groups posts☆44Mar 3, 2026Updated 3 weeks ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆59Sep 18, 2025Updated 6 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- CI/CD Co-located ハンズオンイベントのドキュメントです。☆10Nov 1, 2021Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- ☆20Apr 10, 2025Updated 11 months ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Awesome MalDev Links☆52Mar 18, 2026Updated last week
- Simple Tool for webhacking☆12Apr 4, 2023Updated 2 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆937Jun 26, 2023Updated 2 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆710Apr 21, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool to rip system and user data from OSX and macOS☆16Dec 6, 2022Updated 3 years ago
- Using plotly to perfom data visualization of ransomware leak site data☆14Feb 15, 2024Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆222Jun 7, 2024Updated last year
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- ☆26Jan 23, 2025Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆120Sep 9, 2022Updated 3 years ago