hazcod / ransomwhereLinks
A PoC ransomware sample to test out your ransomware response strategy.
☆213Updated 3 weeks ago
Alternatives and similar repositories for ransomwhere
Users that are interested in ransomwhere are comparing it to the libraries listed below
Sorting:
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆191Updated 11 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆200Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆179Updated 6 months ago
- An open-source self-hosted purple team management web application.☆293Updated 2 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆322Updated 7 months ago
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- Just some lists of Malware Configs☆173Updated 11 months ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Updated 2 years ago
- Ransomware simulator written in Golang☆459Updated 3 years ago
- ☆195Updated last year
- An ADCS honeypot to catch attackers in your internal network.☆318Updated last year
- ☆160Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 9 months ago
- ShellSweeping the evil.☆181Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆317Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆370Updated 3 years ago
- ☆167Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆251Updated last month
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆105Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last month
- God Mode Detection Rules☆134Updated last year
- Pwnspoof repository☆265Updated 2 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆386Updated 2 months ago
- firedrill is a malware simulation harness for evaluating your security controls☆194Updated last year
- ☆139Updated 2 years ago