soufianetahiri / RansomwareMonitor
A ransomware group monitoring bot written in C#.
☆55Updated 2 years ago
Alternatives and similar repositories for RansomwareMonitor:
Users that are interested in RansomwareMonitor are comparing it to the libraries listed below
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 9 months ago
- Hunt malware with Volatility☆47Updated 8 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆109Updated 3 years ago
- This repo is where I store my Threat Hunting ideas/content☆86Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆17Updated 2 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆33Updated 2 years ago
- C2 Active Scanner☆51Updated 7 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆84Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- IOC Collection 2022☆56Updated last year
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆64Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated this week
- Carbon Black Response IR tool☆53Updated 4 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆12Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated 8 months ago
- ☆27Updated this week
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆146Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Sniffing out well-known threat groups☆28Updated 5 months ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆53Updated 9 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago