lawndoc / RanSimLinks
Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.
☆238Updated last year
Alternatives and similar repositories for RanSim
Users that are interested in RanSim are comparing it to the libraries listed below
Sorting:
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆155Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆175Updated 6 months ago
- ☆160Updated 2 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆324Updated 9 months ago
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Updated 2 years ago
- An open-source self-hosted purple team management web application.☆300Updated last week
- A PoC ransomware sample to test out your ransomware response strategy.☆211Updated 2 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- ☆125Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 3 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- PowerShell Ransomware Simulator with C2 Server☆500Updated last month
- ☆194Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆195Updated 11 months ago
- Ransomware simulator written in C#☆37Updated 3 years ago
- Just some lists of Malware Configs☆173Updated last year
- ☆173Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 10 months ago
- A collection of CVEs weaponized by ransomware operators☆129Updated 3 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆109Updated last year
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Updated 3 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆153Updated last month
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆180Updated 8 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆413Updated 3 weeks ago
- MAL-CL (Malicious Command-Line)☆322Updated 3 years ago