MeltingBot / fake_ransomware_groupLinks
Interactive simulation of a fictional ransomware group's dashboard
☆12Updated last year
Alternatives and similar repositories for fake_ransomware_group
Users that are interested in fake_ransomware_group are comparing it to the libraries listed below
Sorting:
- ☆56Updated 11 months ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Updated 10 months ago
- Speed up your pentest enumeration☆83Updated 3 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆55Updated 2 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- Repo to hold wazuh manager mcp server☆71Updated 3 months ago
- ☆74Updated last week
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 9 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Updated 2 years ago
- Sniffing out well-known threat groups☆64Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆190Updated 2 weeks ago
- Identify the accounts most vulnerable to dictionary attacks☆121Updated 9 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 11 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 7 months ago
- A runbook for handling security incidents in cooperation with 0xsyr0☆52Updated 3 years ago
- Dredging up secrets from the depths of the file system☆131Updated last year
- God Mode Detection Rules☆135Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆83Updated last month
- VirtualGHOST Detection Tool☆101Updated last month
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 6 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆156Updated last month
- Living Off Security Tools☆58Updated last month
- Analyze pcaps with Zeek and a Grafana Dashboard☆189Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago