HalilDeniz / RansomwareSimLinks
RansomwareSim is a simulated ransomware
☆162Updated last year
Alternatives and similar repositories for RansomwareSim
Users that are interested in RansomwareSim are comparing it to the libraries listed below
Sorting:
- ☆123Updated last year
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆222Updated 3 weeks ago
- Persistent Powershell backdoor tool {😈}☆118Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆229Updated 11 months ago
- NetProbe: Network Probe☆164Updated 11 months ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆53Updated 7 months ago
- List Of Ransomware Groups Official WebSites☆99Updated this week
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆89Updated 3 months ago
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated last year
- Just some lists of Malware Configs☆172Updated 8 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 5 months ago
- The LockBit builder files☆132Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆167Updated 3 weeks ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- CryptChat: Beyond Secure Messaging 🛡️☆71Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆416Updated last month
- ☆298Updated last year
- Small collection of Ransomware organized by family.☆249Updated 11 months ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆143Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆372Updated last year
- ☆314Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year
- ☆41Updated 8 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆142Updated last year
- Command & Control-Framework created for collaboration in python3☆319Updated 2 years ago
- PowerShell Obfuscator☆200Updated 3 weeks ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆105Updated last week
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆100Updated 10 months ago