Can you pay the ransom in your country?
☆14Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for ransomwarelegality
Users that are interested in ransomwarelegality are comparing it to the libraries listed below
Sorting:
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- MISP website (hugo-based)☆25Updated this week
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 11 months ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- A list of books suggested by the security community to aid intelligence analysts learn to think☆28Aug 7, 2023Updated 2 years ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- Manage user's subscriptions based on invitation.☆12Sep 25, 2023Updated 2 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- ☆33Oct 16, 2025Updated 4 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Automated remote exports (snapshots) for your Bitwarden vault☆10Jun 14, 2024Updated last year
- ☆10Jun 16, 2021Updated 4 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Incident Notification Platform by @NC3-LU☆11Updated this week
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 6 months ago
- Opensource Telegram (Osint) Tool☆21Jan 3, 2025Updated last year
- Mixnet Messaging App☆11Oct 3, 2025Updated 5 months ago
- A Jekyll template that uses Simple.css and no plugins☆12May 7, 2024Updated last year
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- ☆14Mar 10, 2021Updated 4 years ago
- This is an update for wvthoog proxmox vGPU script with extended driver Supports☆14May 7, 2025Updated 9 months ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- CyberSniff Desktop Client☆18Jul 13, 2022Updated 3 years ago
- A PowerShell module to generate an as built report on the configuration of VEEAM Backup & Replication Infrastructure.☆11Feb 20, 2026Updated last week
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Updated this week
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Code used in analysis and visualisation of IUCN threat maps☆15Aug 26, 2021Updated 4 years ago