Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.
☆244Oct 14, 2024Updated last year
Alternatives and similar repositories for RanSim
Users that are interested in RanSim are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ransomware Simulator for Red/Blue teams to test their defences.☆20Apr 4, 2022Updated 4 years ago
- PowerShell Ransomware Simulator with C2 Server☆501Jan 2, 2026Updated 3 months ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Nov 16, 2020Updated 5 years ago
- A simple demonstration tool to simulate a ransomware attack☆43Mar 17, 2026Updated last month
- Ransomware simulator written in Golang☆475Jun 30, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Mar 28, 2018Updated 8 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Notes and IoCs of fresh malware☆63Jul 5, 2024Updated last year
- Repository and archive for Killing The Bear Gitbook☆82Aug 15, 2023Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆281Mar 1, 2021Updated 5 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆485Oct 14, 2022Updated 3 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,233Aug 18, 2023Updated 2 years ago
- firedrill is a malware simulation harness for evaluating your security controls☆199Jan 26, 2024Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- Cisco CallManager User Enumeration☆16Aug 16, 2022Updated 3 years ago
- ☆16May 20, 2022Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated 2 years ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆181Jul 6, 2021Updated 4 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,503Dec 21, 2023Updated 2 years ago
- A C2 post-exploitation framework☆487Jan 24, 2024Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135May 25, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,473Aug 18, 2023Updated 2 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆211Feb 10, 2026Updated 2 months ago
- ExchangeHound is a defensive BloodHound OpenGraph collector for on-prem Microsoft Exchange that maps mailbox delegation and Exchange priv…☆62Apr 17, 2026Updated last week
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Send phishing messages and attachments to Microsoft Teams users☆1,114Jun 19, 2024Updated last year
- Lifetime AMSI bypass☆674Sep 26, 2023Updated 2 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,108Dec 11, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A swiss army knife for pentesting networks☆25Sep 3, 2022Updated 3 years ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆462Mar 25, 2024Updated 2 years ago
- Your template-based BloodHound terminal companion tool☆448Jan 21, 2026Updated 3 months ago
- Framework for Kerberos relaying☆946May 29, 2022Updated 3 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆190Jan 30, 2023Updated 3 years ago
- ☆834Sep 9, 2022Updated 3 years ago