HalilDeniz / RansomwareSimLinks
RansomwareSim is a simulated ransomware
☆163Updated last year
Alternatives and similar repositories for RansomwareSim
Users that are interested in RansomwareSim are comparing it to the libraries listed below
Sorting:
- ☆123Updated last year
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆54Updated 7 months ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆220Updated last month
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆100Updated this week
- List Of Ransomware Groups Official WebSites☆108Updated this week
- NetProbe: Network Probe☆164Updated 11 months ago
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆113Updated last week
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated 11 months ago
- Just some lists of Malware Configs☆172Updated 9 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 6 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆231Updated 11 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆169Updated last month
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆90Updated 4 months ago
- ☆314Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated last year
- ☆55Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- The LockBit builder files☆135Updated last year
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated last year
- CryptChat: Beyond Secure Messaging 🛡️☆71Updated last year
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆425Updated last month
- ☆300Updated last year