soufianetahiri / RansomwareMonitor
A ransomware group monitoring bot written in C#.
☆55Updated 2 years ago
Alternatives and similar repositories for RansomwareMonitor:
Users that are interested in RansomwareMonitor are comparing it to the libraries listed below
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 11 months ago
- IOC Collection 2022☆57Updated 2 years ago
- Hunt malware with Volatility☆47Updated 10 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆113Updated 3 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- A home for detection content developed by the delivr.to team☆67Updated last month
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆17Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆92Updated 2 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated last year
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated 3 weeks ago
- ☆63Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- ☆86Updated last year
- Notes and IoCs of fresh malware☆57Updated 8 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- Forensics artifacts collection☆19Updated 3 years ago
- ☆66Updated 2 years ago