toniall / ransomchatLinks
Ransomware Chat Simulation
☆16Updated 9 months ago
Alternatives and similar repositories for ransomchat
Users that are interested in ransomchat are comparing it to the libraries listed below
Sorting:
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆94Updated 2 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- IOCs collected during day-to-day activities☆89Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆115Updated 2 years ago
- ☆52Updated 4 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆117Updated 3 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆145Updated this week
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 3 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 10 months ago
- A collection of CVEs weaponized by ransomware operators☆128Updated 2 months ago
- Just some lists of Malware Configs☆173Updated 11 months ago
- ☆148Updated 2 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆55Updated last year
- Sniffing out well-known threat groups☆64Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999☆115Updated last week
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆104Updated this week
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆140Updated 2 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 10 months ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆116Updated last year
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆21Updated 9 months ago
- ☆132Updated 2 years ago
- Windows Forensics Environment Builder☆170Updated 3 weeks ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆160Updated 8 months ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago