hazcod / ransomwhere
A PoC ransomware sample to test out your ransomware response strategy.
☆206Updated 2 months ago
Alternatives and similar repositories for ransomwhere:
Users that are interested in ransomwhere are comparing it to the libraries listed below
- Rapidly Search and Hunt through Linux Forensics Artifacts☆189Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆217Updated 4 months ago
- Pwnspoof repository☆258Updated last year
- Ransomware simulator written in Golang☆424Updated 2 years ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated this week
- CLI tools for forensic investigation of Windows artifacts☆325Updated 3 months ago
- An open-source self-hosted purple team management web application.☆255Updated last month
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆191Updated last month
- Blue Team detection lab created with Terraform and Ansible in Azure.☆145Updated 3 months ago
- Free training course offered at Hack Space Con 2023☆137Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 10 months ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆147Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆177Updated 2 months ago
- ☆158Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆249Updated last year
- Data visualization for blue teams☆125Updated 2 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆290Updated 6 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆314Updated 4 months ago
- ☆485Updated last year
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆486Updated 2 years ago
- Just some lists of Malware Configs☆168Updated last month
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- ShellSweeping the evil.☆163Updated 2 months ago
- MISP Playbooks☆184Updated last week
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- Infrastructure Automation☆337Updated 10 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆147Updated last year
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆279Updated 2 years ago
- An ADCS honeypot to catch attackers in your internal network.☆280Updated 7 months ago