All about ransomware notes and extension files.
☆14Aug 26, 2023Updated 2 years ago
Alternatives and similar repositories for Ransomware-NOTE
Users that are interested in Ransomware-NOTE are comparing it to the libraries listed below
Sorting:
- ☆17Jul 20, 2024Updated last year
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- Guides, articles, and a lot of Azure Monitor information☆39Apr 18, 2021Updated 4 years ago
- Blackbird OSINT tool FrontEnd React Project☆13Mar 6, 2024Updated last year
- Configurations for a vertical 72" PiWall system☆13Jan 21, 2017Updated 9 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Conditional Access baseline for March 2025☆12Mar 4, 2025Updated last year
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆18Sep 9, 2025Updated 5 months ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- view RedFlagDeals.com from the command line☆10Jul 6, 2024Updated last year
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- Postman collections for interacting with Cisco Stealthwatch Enterprise APIs☆10Apr 26, 2023Updated 2 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- ☆17Feb 25, 2026Updated last week
- Regain device access if denied/disabled by other programs (esp. device control programs, ransomware)☆12Dec 13, 2019Updated 6 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆15Nov 29, 2023Updated 2 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Simulateurs et librairies de calculs pour les indépendants.☆23Updated this week
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 5 years ago
- ☆16Feb 19, 2025Updated last year
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- This repository contain all sources for Kaisen Linux alpha and beta ISO (packages, themes, icons, menus, launchers...)☆11Jun 8, 2020Updated 5 years ago
- PINTool to help analyzing malware that uses process injection☆16Jan 3, 2022Updated 4 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- ✨ Mullvad Account Bruteforcer & Checker Written in Python ✨☆20Jul 5, 2023Updated 2 years ago
- ☆15Aug 12, 2024Updated last year
- ☆10Jul 16, 2023Updated 2 years ago
- XMRig Service Installer: An automation tool to swiftly set up the xmrig mining software as a background service on Windows. Designed for …☆14Nov 16, 2024Updated last year
- GHARF is an efficient support framework for Red Team exercises that applies the concept of CI/CD☆37Jul 14, 2025Updated 7 months ago
- Recommandations de la CNIL pour le télétravail☆12May 12, 2020Updated 5 years ago
- ☆12Aug 21, 2020Updated 5 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆14Aug 22, 2020Updated 5 years ago
- Recover lost code from SOURCEdefender encrypted files☆13Aug 25, 2025Updated 6 months ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- ☆10Mar 3, 2021Updated 5 years ago
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 9 years ago
- A ransomware group monitoring bot written in C#.☆57Apr 12, 2022Updated 3 years ago
- Support in Delphi for WebP and Heif image codecs with a wrapper for the DLLs.☆15Mar 6, 2025Updated 11 months ago
- RatChatPT☆16Jun 9, 2023Updated 2 years ago