Vulnerability Databases

Malware

MISP

Active Countermeasures Threat Hunting

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/36dcb4d4-429d-44bf-a330-0518ea0ed1bc/ransomware-attack-chain.png

http://random-class.s3.amazonaws.com/beacon-simulator.v0.2.tar.gz