hazcod / ransomwhere
A PoC ransomware sample to test out your ransomware response strategy.
☆207Updated 2 months ago
Alternatives and similar repositories for ransomwhere:
Users that are interested in ransomwhere are comparing it to the libraries listed below
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆292Updated 7 months ago
- Ransomware simulator written in Golang☆426Updated 2 years ago
- Pwnspoof repository☆258Updated last year
- Free training course offered at Hack Space Con 2023☆137Updated last year
- An open-source self-hosted purple team management web application.☆260Updated this week
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆249Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated 2 weeks ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆219Updated 4 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆180Updated 3 weeks ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆181Updated 2 months ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆149Updated last year
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆358Updated 2 years ago
- An ADCS honeypot to catch attackers in your internal network.☆283Updated 8 months ago
- Just some lists of Malware Configs☆168Updated 2 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆188Updated last year
- Infrastructure Automation☆340Updated 11 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆315Updated 4 months ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 11 months ago
- ☆133Updated last year
- Data visualization for blue teams☆125Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 10 months ago
- Scan vulnerable drivers on Windows with loldrivers.io☆170Updated last year
- ☆156Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆283Updated 10 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆200Updated 2 years ago
- Some scripts to abuse kerberos using Powershell☆328Updated last year
- Azure mindmap for penetration tests☆179Updated last year