Manticore-Platform / ransomware-emulationLinks
Manticore Ransomware Emulation - Educational Purpose Only!
☆10Updated 5 years ago
Alternatives and similar repositories for ransomware-emulation
Users that are interested in ransomware-emulation are comparing it to the libraries listed below
Sorting:
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- Manticore Adversary Emulation Cli☆47Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- Lightweight File Integrity Monitoring Tool☆33Updated last year
- OWASP Foundation Web Respository☆36Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Updated 2 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Updated 3 years ago
- ☆46Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- ☆54Updated 4 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- Cobalt Strike/C2 Servers☆13Updated 4 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Updated 5 months ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated 10 months ago