Loading...
Browse 96 ransomware tools
DNS RPZ firewall blocking malicious domains at DNS layer using threat intel
DNS RPZ firewall blocking malicious domains at DNS layer using threat intel
Cyber threat intelligence feeds covering malware, phishing, C2s & more
Cyber threat intelligence feeds covering malware, phishing, C2s & more
Cybersecurity podcast covering threat analysis and security trends
Cyber threat intelligence platform for monitoring threats, TTPs, and IOCs
Cyber threat intelligence platform for monitoring threats, TTPs, and IOCs
Real-time threat intelligence platform for monitoring attacks and breaches
Real-time threat intelligence platform for monitoring attacks and breaches
AI-driven cyber threat intelligence platform for threat detection and analysis
AI-driven cyber threat intelligence platform for threat detection and analysis
Email security gateway protecting against phishing, BEC, and email-borne threats
Email security gateway protecting against phishing, BEC, and email-borne threats
Threat intelligence platform providing global threat visibility and IoCs
Threat intelligence platform providing global threat visibility and IoCs
DNS-layer threat blocking service with real-time threat intelligence feeds
DNS-layer threat blocking service with real-time threat intelligence feeds
Dark web monitoring platform for threat detection and fraud protection
Dark web monitoring platform for threat detection and fraud protection
Automated ransomware attack emulation platform for defense validation
Automated ransomware attack emulation platform for defense validation
Digital risk protection platform monitoring deep/dark web and attack surfaces
Digital risk protection platform monitoring deep/dark web and attack surfaces
SaaS-based threat exposure management for attack surface and risk mitigation
SaaS-based threat exposure management for attack surface and risk mitigation
Dark web investigation platform with comprehensive database and analysis tools
Dark web investigation platform with comprehensive database and analysis tools
CTI platform combining automated collection with cyber HUMINT for threat intel
CTI platform combining automated collection with cyber HUMINT for threat intel
Dark web monitoring platform for detecting data leaks and brand threats
Dark web monitoring platform for detecting data leaks and brand threats
The Ransomware Tool Matrix is a repository that lists and categorizes tools used by ransomware gangs, aiding in threat hunting, incident response, and adversary emulation.
The Ransomware Tool Matrix is a repository that lists and categorizes tools used by ransomware gangs, aiding in threat hunting, incident response, and adversary emulation.
A collection of YARA rules for Windows, Linux, and Other threats.
A collection of YARA rules for Windows, Linux, and Other threats.
Platform offering cybersecurity courses for Red, Blue, and Purple Teamers by Picus.
Platform offering cybersecurity courses for Red, Blue, and Purple Teamers by Picus.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
No More Ransom is a collaborative project to combat ransomware attacks by providing decryption tools and prevention advice.
No More Ransom is a collaborative project to combat ransomware attacks by providing decryption tools and prevention advice.
Cybersecurity conference with talks on privacy, security monitoring, ransomware, and more.
Cybersecurity conference with talks on privacy, security monitoring, ransomware, and more.
Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.
Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.
A simple ransomware protection that intercepts and kills malicious processes attempting to delete shadow copies using vssadmin.exe.
A simple ransomware protection that intercepts and kills malicious processes attempting to delete shadow copies using vssadmin.exe.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance