rkovar / ransomwarelegality
Can you pay the ransom in your country?
☆13Updated last year
Alternatives and similar repositories for ransomwarelegality:
Users that are interested in ransomwarelegality are comparing it to the libraries listed below
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated this week
- ☆14Updated last year
- Threat Box Assessment Tool☆19Updated 3 years ago
- Scripts and lists to help generate YARA friendly string mutations☆20Updated last year
- Yara rules☆20Updated last year
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated last year
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆33Updated 3 years ago
- ☆20Updated last year
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Logbook for Digital Forensics and Incident Response☆50Updated 7 months ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆39Updated 2 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 2 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆53Updated 2 weeks ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated 2 weeks ago
- A web scraper to create MISP events and reports☆14Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆24Updated last month
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated last week
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Updated 2 years ago
- my MSTICpy practice and custom tools repository☆11Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated 2 months ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- The core backend server handling API requests and task management☆35Updated this week
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago