Skip to content

JMousqueton/ransomware.live

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Ransomware.live Logo

Ransomware.live

Ransomware.live is originally a fork of ransomwatch.
It is a ransomware leak site monitoring tool that scrapes entries from various ransomware leak sites and publishes them.

πŸ”— GitHub repository: https://github.com/JMousqueton/ransomware.live

Ransomware.live handles data collection, parsing, enrichment, and automation to maintain the database.


πŸ“Œ Features

  • Automated scraping of ransomware leak sites (including .onion domains via Tor)
  • Integration with Hudson Rock for infostealer data via a Telegram bot
  • Data management tools for victims and groups
  • Image capture of leak site posts with watermarking, metadata, and optional face blurring
  • Notifications via ntfy and Bluesky servers
  • Environment-based configuration via .env

πŸ“‚ Repository Structure

ransomwarelive/
β”‚
β”œβ”€β”€ bin/                  # Core Python scripts and libraries
|   β”œβ”€β”€ _parser/          # All parsers 
β”‚   β”œβ”€β”€ libcapture.py     # Capture victim/group screenshots
β”‚   β”œβ”€β”€ hudsonrockapi.py  # Hudson Rock API integration via Telegram bot
β”‚   β”œβ”€β”€ parse.py          # Parse collected data into structured formats
β”‚   β”œβ”€β”€ scrape.py         # Main scraping engine
β”‚   β”œβ”€β”€ manage.py         # Management CLI
β”‚   β”œβ”€β”€ shared_utils.py   # Shared helper functions
β”‚   β”œβ”€β”€ victims-browser.py# Victim data viewer
β”‚   β”œβ”€β”€ status.py         # System health and process status
β”‚   β”œβ”€β”€ rsslib.py         # (Optional) RSS feed generation
β”‚   └── requirements.txt  # Python dependencies
β”‚
β”œβ”€β”€ images/               # Static assets & watermarks
β”œβ”€β”€ db/                   # Local databases (JSON)
β”œβ”€β”€ tmp/                  # Temporary working files
└── .env.sample           # Example environment configuration


---

## βš™οΈ Installation

### 1. Clone the Repository
```bash
git clone https://github.com/JMousqueton/ransomware.live.git
cd ransomwarelive

2. Create a Virtual Environment

python3 -m venv venv
source venv/bin/activate

3. Install Dependencies

pip install -r bin/requirements.txt

4. Configure Environment

Copy the example .env file and edit it with your configuration:

cp .env.sample .env
nano .env

πŸš€ Usage

Start Scraping

cd bin
python scrape.py

Parse Collected Data

cd bin
python parse.py

Manage Data

cd bin
python manage.py --help 

πŸ›‘οΈ Requirements

  • Python 3.9+
  • Tor service running locally for .onion access
  • Telegram bot credentials (used to query Hudson Rock for infostealer data)
  • ntfy server credentials (for notifications)
  • Bluesky server credentials (for notifications)
  • Unix-based environment (Linux/macOS) recommended

πŸ“œ License

This project is licensed under the unlicense License**.
See the LICENSE file for details.


⚠️ Disclaimer

This project is for research and educational purposes only.
Do not use it for unauthorized access to systems or data.
The maintainers take no responsibility for misuse of the code.

This project is only the parsing and scraping, not the website.


🀝 Contributing

Contributions are welcome!
Please open an issue or submit a pull request to suggest improvements or add new features.


Maintainer: Julien Mousqueton
Website: https://ransomware.live