hazcod / ransomwhereLinks
A PoC ransomware sample to test out your ransomware response strategy.
☆212Updated 4 months ago
Alternatives and similar repositories for ransomwhere
Users that are interested in ransomwhere are comparing it to the libraries listed below
Sorting:
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆228Updated 10 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- An open-source self-hosted purple team management web application.☆286Updated last week
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆175Updated 3 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 6 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆196Updated last year
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- Pwnspoof repository☆264Updated last year
- firedrill is a malware simulation harness for evaluating your security controls☆188Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆157Updated 2 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆254Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆188Updated 8 months ago
- ☆197Updated last year
- Just some lists of Malware Configs☆172Updated 7 months ago
- ☆122Updated last year
- ☆160Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆319Updated 3 months ago
- An ADCS honeypot to catch attackers in your internal network.☆309Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆198Updated 3 weeks ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆160Updated 3 years ago
- ShellSweeping the evil.☆179Updated 9 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆248Updated 5 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆314Updated last year
- ☆161Updated 2 years ago
- Data visualization for blue teams☆126Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated 11 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- A collection of CVEs weaponized by ransomware operators☆121Updated last week
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆169Updated last month