JMousqueton / Badware
Ransomware for demonstration
☆15Updated 2 years ago
Alternatives and similar repositories for Badware:
Users that are interested in Badware are comparing it to the libraries listed below
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- Small collection of Active Directory pentesting tools.☆30Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 9 months ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 11 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆29Updated this week
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Powerfull scripts to bypass windows defender☆9Updated 3 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆14Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- A collection of my presentation materials.☆17Updated 11 months ago
- Passworld is a fully customizable wordlist generator☆15Updated 7 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- ☆12Updated 3 years ago
- ☆14Updated 3 months ago