d4rk-d4nph3 / Ransomware-Reports
This repo is a collection of Ransomware reports from vendors, researchers, etc.
☆111Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Ransomware-Reports
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated 11 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆80Updated 2 years ago
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- ☆90Updated 3 weeks ago
- ☆130Updated 9 months ago
- Research indicators and detection rules☆66Updated last year
- The Windows Malware Analysis Reversing Core Tools☆89Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆110Updated 10 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- c2 traffic☆188Updated last year
- YARA rule analyzer to improve rule quality and performance☆93Updated 11 months ago
- JPCERT/CC public YARA rules repository☆101Updated 4 months ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆98Updated 2 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago
- A guide on how to write fast and memory friendly YARA rules☆124Updated last year
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆111Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆142Updated last year
- Active C2 IoCs☆96Updated last year
- Live forensic artifacts collector☆160Updated 4 months ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆164Updated 2 months ago
- Notes and IoCs of fresh malware☆58Updated 4 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆194Updated 2 years ago
- Community modules for CAPE Sandbox☆85Updated this week
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆48Updated 6 months ago
- ☆187Updated last year
- File analysis and management framework.☆71Updated last year
- Threat Hunting tool about Sysmon and graphs☆329Updated last year
- Mindmaps for threat hunting - work in progress.☆150Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆239Updated last year