rkovar / ransomwarelegalityLinks
Can you pay the ransom in your country?
☆14Updated last year
Alternatives and similar repositories for ransomwarelegality
Users that are interested in ransomwarelegality are comparing it to the libraries listed below
Sorting:
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 5 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- ☆14Updated 2 years ago
- The core backend server handling API requests and task management☆43Updated this week
- A web scraper to create MISP events and reports☆16Updated last month
- Cyber Underground General Intelligence Requirements☆94Updated last year
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- Quick ESXi Log Parser☆24Updated 6 months ago
- A home for detection content developed by the delivr.to team☆69Updated last week
- ☆22Updated 2 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆49Updated last year
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 2 weeks ago
- Offensive Research Guide to Help Defense Improve Detection☆31Updated 2 years ago
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 9 months ago
- Scripts and lists to help generate YARA friendly string mutations☆21Updated 2 years ago
- C2 Active Scanner☆59Updated last year
- CSIRT Jump Bag☆26Updated last year
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆45Updated 3 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆98Updated 9 months ago