HalilDeniz / RansomwareSimLinks
RansomwareSim is a simulated ransomware
☆169Updated last year
Alternatives and similar repositories for RansomwareSim
Users that are interested in RansomwareSim are comparing it to the libraries listed below
Sorting:
- ☆124Updated last year
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆225Updated 5 months ago
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- The LockBit builder files☆146Updated last year
- NetProbe: Network Probe☆172Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆171Updated 5 months ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆54Updated 11 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Updated last year
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆146Updated last month
- List Of Ransomware Groups Official WebSites☆147Updated 2 weeks ago
- ☆133Updated 3 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- Just some lists of Malware Configs☆173Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 9 months ago
- Powershell tools used for Red Team / Pentesting.☆80Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 8 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆502Updated 5 months ago
- NetworkAssessment: Network Compromise Assessment Tool☆94Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year
- ☆55Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Updated last year
- ☆44Updated last year
- ☆317Updated last year
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆60Updated last year
- PowerShell Obfuscator☆226Updated 5 months ago
- Command & Control-Framework created for collaboration in python3☆320Updated 2 years ago