HalilDeniz / RansomwareSimLinks
RansomwareSim is a simulated ransomware
☆165Updated last year
Alternatives and similar repositories for RansomwareSim
Users that are interested in RansomwareSim are comparing it to the libraries listed below
Sorting:
- ☆124Updated last year
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆224Updated 3 months ago
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- NetProbe: Network Probe☆169Updated last year
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆55Updated 9 months ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆236Updated last year
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆126Updated 3 weeks ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 7 months ago
- NetworkAssessment: Network Compromise Assessment Tool☆94Updated last year
- Just some lists of Malware Configs☆173Updated 10 months ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆142Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆141Updated 2 years ago
- PowerShell Obfuscator☆218Updated 2 months ago
- ☆317Updated last year
- Red Team Guides☆143Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- ☆305Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆449Updated 3 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆171Updated 2 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆103Updated last year
- Free training course offered at Hack Space Con 2023☆139Updated 2 years ago
- ☆43Updated 11 months ago
- The LockBit builder files☆140Updated last year
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆118Updated last year
- Cyber Security Awareness Framework (CSAF)☆100Updated 8 months ago
- List Of Ransomware Groups Official WebSites☆117Updated last week
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆33Updated last year