Manticore-Platform / ransomware-emulationLinks
Manticore Ransomware Emulation - Educational Purpose Only!
☆10Updated 5 years ago
Alternatives and similar repositories for ransomware-emulation
Users that are interested in ransomware-emulation are comparing it to the libraries listed below
Sorting:
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Manticore Adversary Emulation Cli☆48Updated 5 years ago
- Random Exploits☆50Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- ☆47Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆44Updated 8 months ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Cobalt Strike/C2 Servers☆13Updated 4 years ago
- ☆54Updated 4 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated last year
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 10 years ago
- ☆90Updated 3 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆55Updated 5 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆87Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- Deployment code for ashirt-server☆20Updated last week
- Lightweight File Integrity Monitoring Tool☆33Updated last year