<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>ransomware</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/1094/feed"/>
    <updated>2026-04-25T08:58:59+00:00</updated>
    <id>https://links.biapy.com/guest/tags/1094/feed</id>
            <entry>
            <id>https://links.biapy.com/links/1233</id>
            <title type="text"><![CDATA[Akira Ransomware Decrypter]]></title>
            <link rel="alternate" href="https://github.com/yohanes/akira-bruteforce" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1233"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[recover data from the Akira ransomware without paying the ransom.]]>
            </summary>
            <updated>2025-08-28T19:22:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3663</id>
            <title type="text"><![CDATA[Ransomware.live]]></title>
            <link rel="alternate" href="https://ransomware.live/#/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3663"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tracking ransomware&amp;#039;s victims since April 2022

A ransomware is a type of malware used by cybercriminals to encrypt the victim&amp;#039;s files and make them inaccessible unless they pay the ransom. Today cybercriminals are more sophisticated, and they not only encrypt the victim&amp;#039;s files also they leaking their data to the Darknet unless they will pay the ransom.

Ransomware.live is originally a fork of ransomwatch and inspired by ransomlook. Ransomware.live is a ransomware leak site monitoring tool. It will scrape all of the entries on various ransomware leak sites and published them.

- [Ransomware.live @ GitHub](https://github.com/jmousqueton/ransomware.live).
- [ 🚨Voici un outil et ressource de surveillance de dataleaks à la suite de ransomware. @ Laurent M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_github-security-cybersecurity-activity-7236257211633577984-iit9/).]]>
            </summary>
            <updated>2025-08-29T02:07:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4198</id>
            <title type="text"><![CDATA[RansomLord]]></title>
            <link rel="alternate" href="https://github.com/malvuln/RansomLord" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4198"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware pre-encryption.

- [RansomLord, un outil open source capable de piéger les ransomwares ! @ IT-Connect :fr:](https://www.it-connect.fr/ransomlord-outil-open-source-anti-ransomware/).
- [RansomLord v3 – Un outil open source qui exploite les failles des ransomwares @ Korben :fr:](https://korben.info/ransomlord-v3-outil-anti-rancongiciel-open-source-exploite-failles.html).]]>
            </summary>
            <updated>2025-08-29T03:36:08+00:00</updated>
        </entry>
    </feed>
