d4rk-d4nph3 / Ransim
Ransomware Simulator for testing Blue Team Detections
☆37Updated 2 years ago
Alternatives and similar repositories for Ransim:
Users that are interested in Ransim are comparing it to the libraries listed below
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆32Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- ☆41Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆27Updated 3 years ago
- ☆16Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆21Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- ☆63Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆39Updated 3 months ago
- ☆14Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆33Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- AutoPoC Generator HoneyPoC☆35Updated last week
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆54Updated 6 months ago
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆55Updated last year