joshhighet / ransomwatch
the transparent ransomware claim tracker π₯·πΌπ§
π₯οΈ
β975Updated this week
Alternatives and similar repositories for ransomwatch:
Users that are interested in ransomwatch are comparing it to the libraries listed below
- Yet another Ransomware gang trackerβ377Updated this week
- A resource containing all the tools each ransomware gangs usesβ927Updated last month
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domainsβ¦β523Updated this week
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabzβ336Updated this week
- β514Updated 4 months ago
- β481Updated 3 weeks ago
- Send phishing messages and attachments to Microsoft Teams usersβ1,056Updated 8 months ago
- Map tracking ransomware, by OCD World Watch teamβ425Updated 5 months ago
- Live Feed of C2 servers, tools, and botnetsβ579Updated this week
- Automatically created C2 Feedsβ585Updated this week
- AIL framework - Analysis Information Leak frameworkβ685Updated this week
- Awesome Security lists for SOC/CERT/CTIβ847Updated this week
- π΄ββ οΈπ° Another Ransomware gang trackerβ177Updated this week
- A query aggregator for OSINT based threat huntingβ879Updated this week
- This project aims to compare and evaluate the telemetry of various EDR products.β1,762Updated last week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the β¦β1,597Updated 3 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessionsβ522Updated this week
- ThePhish: an automated phishing email analysis toolβ1,192Updated 6 months ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligenceβ645Updated 4 months ago
- Ransomware leak site monitoringβ311Updated 2 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchersβ640Updated 3 months ago
- Incident Response Methodologies 2022β1,031Updated last year
- Practical Windows Forensics Trainingβ644Updated 11 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multipleβ¦β637Updated 3 weeks ago
- A centralized and enhanced memory analysis platformβ431Updated 2 weeks ago
- Collection of Cyber Threat Intelligence sources from the deep and dark webβ4,802Updated this week
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifaβ¦β574Updated 3 months ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.β640Updated last year
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)β560Updated 4 months ago
- Malware Configuration And Payload Extractionβ2,199Updated this week