MeltingBot / fake_ransomware_groupLinks
Interactive simulation of a fictional ransomware group's dashboard
β12Updated last year
Alternatives and similar repositories for fake_ransomware_group
Users that are interested in fake_ransomware_group are comparing it to the libraries listed below
Sorting:
- β56Updated 11 months ago
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β81Updated 8 months ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defenseβ¦β31Updated 9 months ago
- Identify the accounts most vulnerable to dictionary attacksβ121Updated 8 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logsβ123Updated 2 years ago
- Speed up your pentest enumerationβ83Updated 2 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Managerβ23Updated 11 months ago
- Sniffing out well-known threat groupsβ64Updated last year
- Repo to hold wazuh manager mcp serverβ69Updated 3 months ago
- Dredging up secrets from the depths of the file systemβ131Updated last year
- β74Updated 2 weeks ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services β¦β103Updated 8 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β197Updated last month
- HookPhish is a Python script designed to aid in the detection of phishing websitesβ40Updated 2 years ago
- A runbook for handling security incidents in cooperation with 0xsyr0β52Updated 3 years ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.β187Updated last week
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.ioβ84Updated last year
- MS Graph Commands and Tools for Blue Teamersβ52Updated 2 years ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.β80Updated 3 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor manβs SOC.β54Updated 2 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from themβ34Updated 6 months ago
- Track C2 servers, tools, and botnets over time by framework and locationβ43Updated 10 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alertsβ125Updated last week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β150Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.β43Updated 2 years ago
- β102Updated 3 months ago
- Cloud subdomains identification toolβ63Updated 8 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraftβ82Updated 2 weeks ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the β¦β142Updated last year
- Powershell tools used for Red Team / Pentesting.β79Updated last year