rkovar / ransomwarelegality
Can you pay the ransom in your country?
☆13Updated last year
Alternatives and similar repositories for ransomwarelegality:
Users that are interested in ransomwarelegality are comparing it to the libraries listed below
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated 2 months ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆33Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- ☆14Updated last year
- CSIRT Jump Bag☆27Updated 9 months ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- A web scraper to create MISP events and reports☆14Updated last year
- my MSTICpy practice and custom tools repository☆11Updated 2 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 3 months ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated last year
- Logbook for Digital Forensics and Incident Response☆50Updated 6 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- ☆20Updated 2 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- The core backend server handling API requests and task management☆34Updated last week
- Scripts and lists to help generate YARA friendly string mutations☆19Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆24Updated 3 weeks ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- ☆19Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆52Updated this week
- A home for detection content developed by the delivr.to team☆64Updated last week
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆26Updated 2 years ago
- Open Threat-Informed Detection Engineering☆32Updated 3 weeks ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated last week
- Yara rules☆20Updated last year
- ☆15Updated 4 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- A tool for studying JavaScript malware.☆14Updated this week