nuke86 / ransomFeed
a ransomware-group dashboard
☆44Updated this week
Alternatives and similar repositories for ransomFeed:
Users that are interested in ransomFeed are comparing it to the libraries listed below
- URL fingerprinting made easy☆86Updated last year
- Tor onion address lookup☆38Updated 2 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated last month
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆41Updated last month
- Ransomware groups posts☆39Updated this week
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆49Updated 3 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 10 months ago
- ☆48Updated last week
- ☆32Updated this week
- ☆32Updated last year
- Extracting IoC data from eMail☆133Updated 4 months ago
- Source code used at TweetFeed.live☆41Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆34Updated last year
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆93Updated 4 months ago
- C2 Active Scanner☆57Updated 10 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆44Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆149Updated 7 months ago
- ShellSweeping the evil.☆164Updated 5 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.☆167Updated 3 months ago
- yara detection rules for hunting with the threathunting-keywords project☆116Updated last month
- Graphical map of known Advanced Persistent Threats☆53Updated last month
- All-sources tool to search websites by favicons☆122Updated 5 months ago
- Find Email Spoofing Vulnerablity of domains☆94Updated 8 months ago
- Maltego transformation for TON investigations☆25Updated last year
- 🏴☠️💰 Another Ransomware gang tracker☆192Updated 2 weeks ago
- information about ransomware groups (Ransomware Analysis Notes)☆37Updated last year