srlabs / black-basta-buster
☆92Updated last year
Alternatives and similar repositories for black-basta-buster:
Users that are interested in black-basta-buster are comparing it to the libraries listed below
- 🏴☠️💰 Another Ransomware gang tracker☆177Updated this week
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆76Updated this week
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆94Updated this week
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆105Updated this week
- CLI tools for forensic investigation of Windows artifacts☆325Updated 3 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆146Updated 5 months ago
- TRACE is a digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆155Updated last week
- ☆125Updated 2 weeks ago
- Repository of tools and resources for analyzing Docker containers☆62Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆145Updated 10 months ago
- God Mode Detection Rules☆134Updated 6 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- Jupyter Notebooks for the Blue Team☆145Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆97Updated last year
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆56Updated 2 years ago
- MISP Playbooks☆184Updated last week
- Forensic Artifact Collection Tool Matrix☆82Updated 3 months ago
- Traps web spiders☆66Updated 4 years ago
- HASH (HTTP Agnostic Software Honeypot)☆136Updated 9 months ago
- The Threat Actor Profile Guide for CTI Analysts☆104Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated last month
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆151Updated 9 months ago
- LOKI2 - Simple IOC and YARA Scanner☆85Updated 6 months ago
- ☆68Updated 6 months ago
- BlackBerry Threat Research & Intelligence☆97Updated last year
- Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools.…☆57Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated this week
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆72Updated 10 months ago
- Website for ail-typo-squatting library☆57Updated 8 months ago