Manticore-Platform / ransomware-emulationLinks
Manticore Ransomware Emulation - Educational Purpose Only!
☆10Updated 5 years ago
Alternatives and similar repositories for ransomware-emulation
Users that are interested in ransomware-emulation are comparing it to the libraries listed below
Sorting:
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Manticore Adversary Emulation Cli☆48Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆37Updated 7 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 5 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- ☆67Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- Lightweight File Integrity Monitoring Tool☆33Updated last year
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- Random Exploits☆50Updated 2 years ago
- ☆30Updated 5 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- ☆54Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- ☆90Updated 3 years ago