A visualized overview of the Initial Access Broker (IAB) cybercrime landscape
☆117Oct 22, 2021Updated 4 years ago
Alternatives and similar repositories for Initial-Access-Broker-Landscape
Users that are interested in Initial-Access-Broker-Landscape are comparing it to the libraries listed below
Sorting:
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- Placeholder for IRIS-H Digital Forensics Tool☆15May 30, 2018Updated 7 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆59Sep 18, 2025Updated 5 months ago
- Random things for my own reference☆22Aug 22, 2022Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated last month
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Oct 25, 2021Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- This repository is related to specialized books published by the THB team.☆20Aug 13, 2025Updated 6 months ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- ☆12Updated this week
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆117Oct 29, 2024Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Resources, tools and utilities about Threat Intelligence☆84Mar 18, 2023Updated 2 years ago
- Anywhere is a powerful botnet that allows for the remote control of compromised devices☆29Jan 19, 2023Updated 3 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Feb 14, 2025Updated last year
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Ransomware groups posts☆44Updated this week
- Simple Tool for webhacking☆12Apr 4, 2023Updated 2 years ago
- ☆17Sep 10, 2021Updated 4 years ago
- A ransomware group monitoring bot written in C#.☆57Apr 12, 2022Updated 3 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆75Updated this week
- ☆20Apr 10, 2025Updated 10 months ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 5 months ago
- Awesome MalDev Links☆39Feb 27, 2026Updated last week
- ☆19Jan 31, 2025Updated last year
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Aug 23, 2025Updated 6 months ago