Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.
☆240Oct 14, 2024Updated last year
Alternatives and similar repositories for RanSim
Users that are interested in RanSim are comparing it to the libraries listed below
Sorting:
- Ransomware Simulator for Red/Blue teams to test their defences.☆19Apr 4, 2022Updated 3 years ago
- PowerShell Ransomware Simulator with C2 Server☆498Jan 2, 2026Updated 2 months ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Nov 16, 2020Updated 5 years ago
- A simple demonstration tool to simulate a ransomware attack☆42Updated this week
- Ransomware simulator written in Golang☆473Jun 30, 2022Updated 3 years ago
- ☆14Mar 28, 2018Updated 7 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Notes and IoCs of fresh malware☆62Jul 5, 2024Updated last year
- Repository and archive for Killing The Bear Gitbook☆83Aug 15, 2023Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆276Mar 1, 2021Updated 5 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,229Aug 18, 2023Updated 2 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- firedrill is a malware simulation harness for evaluating your security controls☆197Jan 26, 2024Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- ☆16May 20, 2022Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆180Jul 6, 2021Updated 4 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,501Dec 21, 2023Updated 2 years ago
- A C2 post-exploitation framework☆484Jan 24, 2024Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135May 25, 2023Updated 2 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆213Feb 10, 2026Updated last month
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Send phishing messages and attachments to Microsoft Teams users☆1,111Jun 19, 2024Updated last year
- Lifetime AMSI bypass☆671Sep 26, 2023Updated 2 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,077Dec 11, 2024Updated last year
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆458Mar 25, 2024Updated last year
- Fully modular persistence framework☆259Apr 10, 2023Updated 2 years ago
- A swiss army knife for pentesting networks☆25Sep 3, 2022Updated 3 years ago
- Your template-based BloodHound terminal companion tool☆446Jan 21, 2026Updated last month
- Framework for Kerberos relaying☆938May 29, 2022Updated 3 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- ☆832Sep 9, 2022Updated 3 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,373Mar 9, 2026Updated last week
- Application Security pipelines☆51May 25, 2022Updated 3 years ago