Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.
☆242Oct 14, 2024Updated last year
Alternatives and similar repositories for RanSim
Users that are interested in RanSim are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ransomware Simulator for Red/Blue teams to test their defences.☆20Apr 4, 2022Updated 4 years ago
- PowerShell Ransomware Simulator with C2 Server☆497Jan 2, 2026Updated 3 months ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Nov 16, 2020Updated 5 years ago
- A simple demonstration tool to simulate a ransomware attack☆43Mar 17, 2026Updated 3 weeks ago
- Ransomware simulator written in Golang☆473Jun 30, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆14Mar 28, 2018Updated 8 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Notes and IoCs of fresh malware☆63Jul 5, 2024Updated last year
- Repository and archive for Killing The Bear Gitbook☆83Aug 15, 2023Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆278Mar 1, 2021Updated 5 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,232Aug 18, 2023Updated 2 years ago
- firedrill is a malware simulation harness for evaluating your security controls☆199Jan 26, 2024Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- Cisco CallManager User Enumeration☆16Aug 16, 2022Updated 3 years ago
- ☆16May 20, 2022Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated 2 years ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆180Jul 6, 2021Updated 4 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,504Dec 21, 2023Updated 2 years ago
- A C2 post-exploitation framework☆486Jan 24, 2024Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135May 25, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆36Jun 5, 2022Updated 3 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆211Feb 10, 2026Updated 2 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Send phishing messages and attachments to Microsoft Teams users☆1,113Jun 19, 2024Updated last year
- Lifetime AMSI bypass☆673Sep 26, 2023Updated 2 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,081Dec 11, 2024Updated last year
- A swiss army knife for pentesting networks☆25Sep 3, 2022Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆458Mar 25, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Fully modular persistence framework☆259Apr 10, 2023Updated 2 years ago
- Your template-based BloodHound terminal companion tool☆448Jan 21, 2026Updated 2 months ago
- Framework for Kerberos relaying☆943May 29, 2022Updated 3 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆190Jan 30, 2023Updated 3 years ago
- ☆834Sep 9, 2022Updated 3 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,376Mar 9, 2026Updated last month
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Jul 27, 2021Updated 4 years ago