Ransomware Chat Simulation
☆21Mar 18, 2025Updated last year
Alternatives and similar repositories for ransomchat
Users that are interested in ransomchat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- material for exploit development☆18May 3, 2019Updated 6 years ago
- This tool is developed for burp suite practitioner certificate exam and HTTP Request Smuggling labs. The most important about this tool i…☆22Sep 15, 2022Updated 3 years ago
- WhatHitMe is a Python3 tool which provides the possible Groups and their attributed Campaigns that may have attacked you in an incident, …☆18Jun 29, 2023Updated 2 years ago
- Incident Response Network Tools☆24Jul 23, 2021Updated 4 years ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆14Sep 20, 2024Updated last year
- Cleanup of older MISP events can require some work until now☆28Apr 5, 2026Updated 2 weeks ago
- ☆31Feb 10, 2023Updated 3 years ago
- MCP server for using the REMnux malware analysis toolkit via AI assistants☆63Mar 31, 2026Updated 2 weeks ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆33Aug 7, 2024Updated last year
- ☆52Feb 21, 2025Updated last year
- 🏴☠️💰 Another Ransomware gang tracker☆317Updated this week
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Jul 23, 2024Updated last year
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆35Nov 13, 2025Updated 5 months ago
- MCP server for AdaptixC2☆29Jul 20, 2025Updated 9 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆74Updated this week
- Archive of TheShadowBrokersLeak☆41Sep 6, 2017Updated 8 years ago
- NodeJS wrapper for KasmVNC web client☆31Jul 31, 2025Updated 8 months ago
- A powerful prompt template engine built upon Jinja☆12Oct 22, 2025Updated 5 months ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆34Mar 1, 2025Updated last year
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Yara sort☆13Updated this week
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated last year
- Application for detecting command and control (C2) communication through network traffic analysis.☆16May 12, 2023Updated 2 years ago
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 2 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆82Nov 18, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated 2 months ago
- ojjson is a library designed to facilitate JSON interactions with Ollama, a large language api (LLM). It leverages the power of Zod for s…☆12Nov 7, 2024Updated last year
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆15Oct 22, 2025Updated 5 months ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago