HalilDeniz / RansomwareSimLinks
RansomwareSim is a simulated ransomware
☆157Updated last year
Alternatives and similar repositories for RansomwareSim
Users that are interested in RansomwareSim are comparing it to the libraries listed below
Sorting:
- ☆123Updated last year
- Just some lists of Malware Configs☆172Updated 7 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆138Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆119Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆228Updated 10 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆162Updated this week
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆98Updated this week
- NetProbe: Network Probe☆163Updated 10 months ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆220Updated last week
- ☆314Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆86Updated 3 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆52Updated 6 months ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆93Updated 3 months ago
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated last year
- The LockBit builder files☆128Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆99Updated 10 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆416Updated 2 weeks ago
- CryptChat: Beyond Secure Messaging 🛡️☆71Updated last year
- ☆55Updated last year
- List Of Ransomware Groups Official WebSites☆93Updated 3 weeks ago
- Identify the accounts most vulnerable to dictionary attacks☆122Updated 4 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆70Updated 4 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- ☆161Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆142Updated last year