Pinned Repositories
api.ransomware.live
The Ransomware.live API Server is a Flask-based web application that provides endpoints to query and retrieve data related to ransomware posts and cyberattacks. This API serves as a backend for Ransomware.live, a service that aggregates and displays information about recent ransomware incidents and groups.
Badware
Ransomware for demonstration
boamp-alert
🔔 Script d'alerte Microsoft Teams ou Mattermost pour les avis de marché ou d'attribution publiés au BOAMP
Bot-CVE-Notif
Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack, Telegram, Discord, PushOver and/or MS Teams.
C2Live
Track C2 over time by framework and location
CTI-MSTeams-Bot
🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️
FlipperZero
Various tools for my flipperzero
github-cve-monitor
Github action for monitoring CVE
PoC-CVE-2022-30190
POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
ransomware.live
🏴☠️💰 Another Ransomware gang tracker
JMousqueton's Repositories
JMousqueton/Badware
Ransomware for demonstration
JMousqueton/Cyber-News-Bot
A bot to retweet everything related to Cyber Security based on hashtag
JMousqueton/awesome-francais
Liste d'outils connus avec leurs alternatives françaises 🇫🇷
JMousqueton/CVE-2023-21716
POC : CVE-2023-21716 Microsoft Word RTF Font Table Heap Corruption
JMousqueton/boamp-extractor
Script d'extraction et de mise en page des AOs publiés au BOAMP
JMousqueton/chat.ransomware.live
Ransomware negotiations HTML generator from JSON (Casualtek/Ransomchats)
JMousqueton/C2Live
Track C2 over time by framework and location
JMousqueton/CTI-Teams-Notification
Teams Notification on closed PR
JMousqueton/deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
JMousqueton/escape-game
JMousqueton/MetaLookup
Extract metadata from various file formats including PDFs, images (PNG, JPEG, TIFF, BMP, GIF), and Office documents (DOCX, XLSX, PPTX).
JMousqueton/Open-Source-Threat-Intel-Feeds
This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash.
JMousqueton/ransomwatch
the transparent ransomware claim tracker 🥷🏼🧅🖥️
JMousqueton/whois.julien.io
Who is Julien Mousqueton ?
JMousqueton/boobsnail
BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.
JMousqueton/CVE-2023-27532
POC for Veeam Backup and Replication CVE-2023-27532
JMousqueton/CVE-2023-34051
VMware Aria Operations for Logs CVE-2023-34051
JMousqueton/CVE-Vulnerability-Information-Downloader
Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created.
JMousqueton/DumpLSASS
JMousqueton/EDRaser
JMousqueton/find-gh-poc
Find CVE PoCs on GitHub
JMousqueton/Get-actionable-Threat-Intelligence-from-Twitter-Jupyter-Notebook
Get actionable Threat Intelligence from Twitter Jupyter Notebook
JMousqueton/ghostgraphs
Statistics for websites using the Ghost blogging platform.
JMousqueton/opencve
CVE Alerting Platform
JMousqueton/search.0t.rocks
JMousqueton/serviceDetector
Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin privileges.
JMousqueton/sping
Split ping, see what direction the loss or latency is on
JMousqueton/tg-keyword-trends
This script searches messages containing specified search terms in Telegram channels the user is a member of.
JMousqueton/veeam-hardened-repository
Sample code for hardening a Veeam Repository
JMousqueton/yara_malware_ransomware
YARA rules, programs for ransomware families