Ransomware.live
š“āā ļøš° Another Ransomware gang tracker
Install / Use
/learn @JMousqueton/Ransomware.liveREADME

Ransomware.live
Ransomware.live is originally a fork of ransomwatch.
It is a ransomware leak site monitoring tool that scrapes entries from various ransomware leak sites and publishes them.
š GitHub repository: https://github.com/JMousqueton/ransomware.live
Ransomware.live handles data collection, parsing, enrichment, and automation to maintain the database.
š Features
- Automated scraping of ransomware leak sites (including
.oniondomains via Tor) - Integration with Hudson Rock for infostealer data via a Telegram bot
- Data management tools for victims and groups
- Image capture of leak site posts with watermarking, metadata, and optional face blurring
- Notifications via ntfy and Bluesky servers
- Environment-based configuration via
.env
š Repository Structure
ransomwarelive/
ā
āāā bin/ # Core Python scripts and libraries
| āāā _parser/ # All parsers
ā āāā libcapture.py # Capture victim/group screenshots
ā āāā hudsonrockapi.py # Hudson Rock API integration via Telegram bot
ā āāā parse.py # Parse collected data into structured formats
ā āāā scrape.py # Main scraping engine
ā āāā manage.py # Management CLI
ā āāā shared_utils.py # Shared helper functions
ā āāā victims-browser.py# Victim data viewer
ā āāā status.py # System health and process status
ā āāā rsslib.py # (Optional) RSS feed generation
ā āāā requirements.txt # Python dependencies
ā
āāā images/ # Static assets & watermarks
āāā db/ # Local databases (JSON)
āāā tmp/ # Temporary working files
āāā .env.sample # Example environment configuration
---
## āļø Installation
### 1. Clone the Repository
```bash
git clone https://github.com/JMousqueton/ransomware.live.git
cd ransomwarelive
2. Create a Virtual Environment
python3 -m venv venv
source venv/bin/activate
3. Install Dependencies
pip install -r bin/requirements.txt
4. Configure Environment
Copy the example .env file and edit it with your configuration:
cp .env.sample .env
nano .env
š Usage
Start Scraping
cd bin
python scrape.py
Parse Collected Data
cd bin
python parse.py
Manage Data
cd bin
python manage.py --help
š”ļø Requirements
- Python 3.9+
- Tor service running locally for
.onionaccess - Telegram bot credentials (used to query Hudson Rock for infostealer data)
- ntfy server credentials (for notifications)
- Bluesky server credentials (for notifications)
- Unix-based environment (Linux/macOS) recommended
š License
This project is licensed under the unlicense License**.
See the LICENSE file for details.
ā ļø Disclaimer
This project is for research and educational purposes only.
Do not use it for unauthorized access to systems or data.
The maintainers take no responsibility for misuse of the code.
This project is only the parsing and scraping, not the website.
š¤ Contributing
Contributions are welcome!
Please open an issue or submit a pull request to suggest improvements or add new features.
Maintainer: Julien Mousqueton
Website: https://ransomware.live
