List with File Extensions used by Ransomware
☆37Mar 5, 2026Updated this week
Alternatives and similar repositories for ransomware-fileext-list
Users that are interested in ransomware-fileext-list are comparing it to the libraries listed below
Sorting:
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆51Sep 22, 2025Updated 5 months ago
- ☆17Jul 20, 2024Updated last year
- Utilities for Microsoft Sentinel☆20Dec 7, 2025Updated 3 months ago
- MFT parser☆74Feb 2, 2025Updated last year
- The list of write-ups, articles, and PoC of various interesting in context of OSINT☆23Mar 13, 2025Updated 11 months ago
- Random things for my own reference☆22Aug 22, 2022Updated 3 years ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆70Aug 20, 2025Updated 6 months ago
- Generate portable TTP intelligence from a web-based report☆31Oct 24, 2022Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- ☆27Feb 9, 2024Updated 2 years ago
- ☆10Updated this week
- Rules shared by the community from 100 Days of YARA 2024☆89Jan 1, 2025Updated last year
- show dwg file on winform and save to image file☆11Jun 20, 2019Updated 6 years ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- Custom variants for ULTRAKILL.☆12Jul 27, 2025Updated 7 months ago
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- DOS Program Development☆13Nov 9, 2022Updated 3 years ago
- Mindmap for OWASP Top 10 LLM Application and Relationship between them☆14Dec 11, 2024Updated last year
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- A Streamlit-based chatbot application using Gemini models for NLP. Features include light/dark mode toggle, model selection (Gemini 1.5 F…☆10May 23, 2024Updated last year
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- TinyRP is a simple lightweight HTTP reverse proxy made in golang☆12Dec 4, 2022Updated 3 years ago
- Rapid Response sample Foundry app☆17Updated this week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Dec 13, 2023Updated 2 years ago
- A series of cloud focused KQL queries for threat hunting and DFIR☆11Oct 21, 2025Updated 4 months ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- ☆39Jun 28, 2019Updated 6 years ago
- Njrat horror source release☆12Oct 19, 2022Updated 3 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- This is my malware database, but I AM NOT RESPONSIABLE FOR ANY DAMAGE + pan koza is a skid and ready to fork this $h!t.☆12May 26, 2024Updated last year
- ☆13Oct 10, 2022Updated 3 years ago
- Discord Rich presence for QBittorrent made with .NET☆11Feb 28, 2026Updated last week
- A collection of the malware I use☆10Jul 24, 2024Updated last year
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month