nuke86 / ransomFeed
a ransomware-group dashboard
☆45Updated this week
Alternatives and similar repositories for ransomFeed
Users that are interested in ransomFeed are comparing it to the libraries listed below
Sorting:
- Tor onion address lookup☆39Updated 3 months ago
- Ransomware groups posts☆39Updated this week
- Graphical map of known Advanced Persistent Threats☆54Updated last month
- ☆48Updated this week
- URL fingerprinting made easy☆86Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 11 months ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆41Updated last month
- Track C2 servers, tools, and botnets over time by framework and location☆39Updated 3 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆51Updated 2 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆95Updated 4 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 6 months ago
- Collection of videos of Raids on Cybercriminals☆19Updated last month
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆50Updated 3 months ago
- Source code used at TweetFeed.live☆41Updated 2 years ago
- Maltego transformation for TON investigations☆25Updated last year
- Building a consolidated RSS feed for articles about cyberattacks☆67Updated this week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 5 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 10 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆197Updated this week
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆34Updated last year
- AIL project training materials☆29Updated 3 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 3 years ago
- ☆32Updated last year
- IOCs collected during day-to-day activities☆54Updated last week