A PoC ransomware sample to test out your ransomware response strategy.
☆212Feb 10, 2026Updated 3 weeks ago
Alternatives and similar repositories for ransomwhere
Users that are interested in ransomwhere are comparing it to the libraries listed below
Sorting:
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- PoCs and tools for investigation of Windows process execution techniques☆953Feb 2, 2026Updated last month
- ☆18Mar 26, 2024Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,470Aug 18, 2023Updated 2 years ago
- ☆23Oct 9, 2024Updated last year
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆784Jun 23, 2023Updated 2 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆676Dec 23, 2022Updated 3 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Oct 22, 2024Updated last year
- ☆62Dec 13, 2025Updated 2 months ago
- ☆84Aug 18, 2022Updated 3 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆96Jan 16, 2026Updated last month
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆239Oct 14, 2024Updated last year
- ☆413Dec 14, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆483Jul 9, 2024Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- A Bumblebee-inspired Crypter☆79Dec 5, 2022Updated 3 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,369Oct 22, 2025Updated 4 months ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,128Oct 21, 2024Updated last year
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆817Feb 17, 2025Updated last year
- Ransomware simulator written in Golang☆471Jun 30, 2022Updated 3 years ago
- A Poc on blocking Procmon from monitoring network events☆110Aug 7, 2025Updated 6 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆103Jan 14, 2024Updated 2 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆750Oct 25, 2025Updated 4 months ago
- ☆381Updated this week
- PowerShell Ransomware Simulator with C2 Server☆499Jan 2, 2026Updated 2 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆402Updated this week
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,051Nov 9, 2024Updated last year
- ☆243Nov 21, 2024Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year