HalilDeniz / RansomwareSimLinks
RansomwareSim is a simulated ransomware
☆167Updated last year
Alternatives and similar repositories for RansomwareSim
Users that are interested in RansomwareSim are comparing it to the libraries listed below
Sorting:
- ☆125Updated last year
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆55Updated 10 months ago
- NetProbe: Network Probe☆169Updated last year
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆224Updated 3 months ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆140Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆121Updated last year
- Just some lists of Malware Configs☆173Updated 11 months ago
- List Of Ransomware Groups Official WebSites☆121Updated last week
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- The LockBit builder files☆141Updated last year
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆33Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆172Updated 3 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 8 months ago
- ☆44Updated 11 months ago
- ☆317Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆143Updated last year
- Red Team Guides☆143Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- NetworkAssessment: Network Compromise Assessment Tool☆94Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆132Updated 2 weeks ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- Small collection of Ransomware organized by family.☆263Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆92Updated 6 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆118Updated last year
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆88Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆457Updated 4 months ago
- CryptChat: Beyond Secure Messaging 🛡️☆72Updated 2 years ago