MeltingBot / fake_ransomware_groupLinks
Interactive simulation of a fictional ransomware group's dashboard
☆12Updated last year
Alternatives and similar repositories for fake_ransomware_group
Users that are interested in fake_ransomware_group are comparing it to the libraries listed below
Sorting:
- ☆56Updated 10 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Updated 11 months ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆31Updated 9 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆81Updated 7 months ago
- Speed up your pentest enumeration☆83Updated 2 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 6 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆182Updated last week
- Automated Active Directory lab running on Proxmox☆88Updated 4 months ago
- ☆74Updated last week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last month
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 3 months ago
- Identify the accounts most vulnerable to dictionary attacks☆121Updated 8 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆141Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 8 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 5 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 5 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 10 months ago
- Shellcode loader based on indirect syscall☆22Updated 10 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Repo to hold wazuh manager mcp server☆68Updated 2 months ago
- ☆44Updated 11 months ago
- Dredging up secrets from the depths of the file system☆132Updated last year
- Sniffing out well-known threat groups☆64Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 6 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆150Updated last week
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆86Updated 7 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year