soufianetahiri / RansomwareMonitor
A ransomware group monitoring bot written in C#.
☆55Updated 2 years ago
Alternatives and similar repositories for RansomwareMonitor:
Users that are interested in RansomwareMonitor are comparing it to the libraries listed below
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 7 months ago
- IOC Collection 2022☆57Updated 2 years ago
- A home for detection content developed by the delivr.to team☆67Updated last month
- Hunt malware with Volatility☆48Updated 10 months ago
- ☆63Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated 10 months ago
- Sniffing out well-known threat groups☆28Updated 7 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated 2 weeks ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- User Feedback Space of #MitreAssistant☆37Updated last year
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 11 months ago
- C2 Active Scanner☆52Updated 8 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆17Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆25Updated 2 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Just my findings of malwares☆44Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 3 years ago