d4rk-d4nph3 / RansimView external linksLinks
Ransomware Simulator for testing Blue Team Detections
☆39Jun 5, 2022Updated 3 years ago
Alternatives and similar repositories for Ransim
Users that are interested in Ransim are comparing it to the libraries listed below
Sorting:
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Ransomware simulator written in Golang☆471Jun 30, 2022Updated 3 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- A script that parses nmap.xml output, identifies all SSL services and automatically performs an sslscan of each service☆14Jul 2, 2025Updated 7 months ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 5 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Fraktal's Ransomware Emulator☆101Apr 5, 2024Updated last year
- PowerShell Ransomware Simulator with C2 Server☆500Jan 2, 2026Updated last month
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 11 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Dec 15, 2025Updated 2 months ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Golang Implementation of Hell's gate☆21May 31, 2023Updated 2 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆235Jun 17, 2022Updated 3 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- Module to update the Krbtgt password☆47Nov 10, 2023Updated 2 years ago
- ☆22Aug 11, 2021Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- This Library provides python bindings to interact with the Cylance API.☆20Mar 20, 2023Updated 2 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated 11 months ago
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆22Apr 16, 2021Updated 4 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 5 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Mar 7, 2023Updated 2 years ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆95Feb 19, 2021Updated 4 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Jun 20, 2019Updated 6 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago