HalilDeniz / RansomwareSimLinks
RansomwareSim is a simulated ransomware
☆157Updated last year
Alternatives and similar repositories for RansomwareSim
Users that are interested in RansomwareSim are comparing it to the libraries listed below
Sorting:
- ☆123Updated last year
- Just some lists of Malware Configs☆172Updated 6 months ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆220Updated 2 months ago
- NetProbe: Network Probe☆162Updated 9 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆156Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆82Updated 2 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- ☆313Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆138Updated 2 years ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆52Updated 5 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- Persistent Powershell backdoor tool {😈}☆119Updated last year
- ☆55Updated last year
- List Of Ransomware Groups Official WebSites☆92Updated last week
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 9 months ago
- Regular Expressions List used in Digital Forensic Tasks☆87Updated 5 months ago
- Small collection of Ransomware organized by family.☆239Updated 10 months ago
- Cyber Security Awareness Framework (CSAF)☆99Updated 4 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆67Updated last year
- The LockBit builder files☆125Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆228Updated 9 months ago
- ☆370Updated this week
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated last year
- ☆40Updated 7 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆69Updated 4 months ago
- Capture screenshots of onion services on an onion service.☆70Updated last year
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆31Updated 5 months ago
- ☆161Updated last year