Manticore-Platform / ransomware-emulation
Manticore Ransomware Emulation - Educational Purpose Only!
☆10Updated 4 years ago
Alternatives and similar repositories for ransomware-emulation:
Users that are interested in ransomware-emulation are comparing it to the libraries listed below
- Manticore Adversary Emulation Cli☆46Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 5 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 4 years ago
- Kubernetes Scanner☆40Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆36Updated 5 years ago
- Simple C2 over the Trello API☆37Updated 2 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- UglyEXe - bypass some AVs☆16Updated 4 years ago
- ☆14Updated 4 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Updated 5 years ago
- ☆34Updated last week
- ☆26Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Continuous kerberoast monitor☆44Updated last year
- Sp00fer blog post -☆25Updated 2 years ago
- ☆33Updated last week
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year