MeltingBot / fake_ransomware_group
Interactive simulation of a fictional ransomware group's dashboard
☆11Updated last month
Related projects ⓘ
Alternatives and complementary repositories for fake_ransomware_group
- Multi-services Asynchronous Honeypot Solution with real-time threat detection☆26Updated last month
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last year
- https://lolad-project.github.io/☆62Updated 2 weeks ago
- Create your own certification authority with server certificates in a full automated way☆28Updated 3 months ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆50Updated this week
- ☆77Updated 7 months ago
- Automated Active Directory lab running on Proxmox☆71Updated last month
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆27Updated this week
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆109Updated 9 months ago
- ☆72Updated this week
- MS Graph Commands and Tools for Blue Teamers☆48Updated last year
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- DFIR ORC PARSER PROJECT☆10Updated 2 weeks ago
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- Dredging up secrets from the depths of the file system☆116Updated 2 weeks ago
- Living Off Security Tools☆41Updated 3 weeks ago
- A Slack bot phishing framework for Red Teaming exercises☆159Updated 6 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆116Updated 3 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆90Updated last week
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆46Updated last month
- ☆40Updated 2 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 8 months ago
- Generate graphs and charts based on password cracking result☆154Updated last year
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆28Updated 2 weeks ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- This is an AD pentest tools collection☆53Updated 4 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆43Updated last month
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆106Updated 5 months ago
- Speed up your pentest enumeration☆82Updated 3 weeks ago
- A collection of tools that I use in CTF's or for assessments☆59Updated last month