HalilDeniz / RansomwareSimLinks
RansomwareSim is a simulated ransomware
☆158Updated last year
Alternatives and similar repositories for RansomwareSim
Users that are interested in RansomwareSim are comparing it to the libraries listed below
Sorting:
- Persistent Powershell backdoor tool {😈}☆119Updated 10 months ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆212Updated 3 weeks ago
- ☆122Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
- PowerShell Obfuscator☆178Updated last year
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated last year
- Just some lists of Malware Configs☆170Updated 5 months ago
- The LockBit builder files☆119Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆170Updated last year
- ☆103Updated 9 months ago
- Generate FUD backdoors☆249Updated 2 years ago
- ☆312Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆121Updated 2 years ago
- CryptChat: Beyond Secure Messaging 🛡️☆70Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆153Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆397Updated last week
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆136Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 7 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆120Updated 3 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆66Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆227Updated 8 months ago
- A collection of Cyber Threat Intelligence information gathered from the depths of the clearnet, deep web and dark web.☆137Updated 3 weeks ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆37Updated last year
- IOCs collected during day-to-day activities☆61Updated this week
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆367Updated last year
- PowerShell Ransomware Simulator with C2 Server☆486Updated last year
- ☆55Updated last year