nuke86 / ransomFeed
a ransomware-group dashboard
☆40Updated this week
Related projects: ⓘ
- Collection of videos of Raids on Cybercriminals☆17Updated 3 months ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆34Updated 3 months ago
- FIT is a Python3 application for forensic acquisition of contents like web pages, emails, social media, etc. directly from the internet.☆60Updated last month
- Ransomware groups posts☆33Updated this week
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆52Updated 3 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆57Updated 8 months ago
- ☆42Updated 5 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆40Updated this week
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆83Updated 5 months ago
- URL fingerprinting made easy☆80Updated 5 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated 8 months ago
- ☆44Updated 2 weeks ago
- C2 Active Scanner☆45Updated 3 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆68Updated last week
- TRACE is a digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆91Updated 2 weeks ago
- Track C2 servers, tools, and botnets over time by framework and location☆35Updated 10 months ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆51Updated last month
- Website for ail-typo-squatting library☆48Updated 3 months ago
- Malicious IP source.☆40Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆89Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆28Updated 4 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆38Updated 8 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 4 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated last month
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆108Updated 5 months ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆12Updated last year
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆34Updated 7 months ago
- Source code used at TweetFeed.live☆36Updated last year