A PoC ransomware sample to test out your ransomware response strategy.
☆213Feb 10, 2026Updated last month
Alternatives and similar repositories for ransomwhere
Users that are interested in ransomwhere are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆674Dec 23, 2022Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆785Jun 23, 2023Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,472Aug 18, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆351Oct 22, 2024Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- PoCs and tools for investigation of Windows process execution techniques☆954Feb 2, 2026Updated last month
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,373Mar 9, 2026Updated 2 weeks ago
- ☆62Dec 13, 2025Updated 3 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆103Jan 14, 2024Updated 2 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PowerShell Ransomware Simulator with C2 Server☆498Jan 2, 2026Updated 2 months ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,135Oct 21, 2024Updated last year
- ☆18Mar 26, 2024Updated last year
- ☆23Oct 9, 2024Updated last year
- A Bumblebee-inspired Crypter☆80Dec 5, 2022Updated 3 years ago
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- Sandman is a NTP based backdoor for hardened networks.☆817Mar 31, 2024Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆484Jul 9, 2024Updated last year
- Convert shellcode into different formats!☆357Jan 24, 2023Updated 3 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Mar 6, 2026Updated 2 weeks ago
- Offensive Lua.☆225Feb 2, 2026Updated last month
- Ransomware simulator written in Golang☆474Jun 30, 2022Updated 3 years ago
- ☆619Feb 5, 2026Updated last month
- This is a repository of resource about Malware techniques☆825Apr 8, 2023Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- ☆412Dec 14, 2023Updated 2 years ago
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,279Feb 15, 2026Updated last month
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,831Nov 3, 2024Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆751Oct 25, 2025Updated 5 months ago
- Deleting Shadow Copies In Pure C++☆118Oct 31, 2022Updated 3 years ago
- Nimbo-C2 is yet another (simple and lightweight) C2 framework☆438Jan 29, 2026Updated last month