leeberg / CashCatRansomwareSimulatorLinks
A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing various monitoring tools
☆87Updated 4 years ago
Alternatives and similar repositories for CashCatRansomwareSimulator
Users that are interested in CashCatRansomwareSimulator are comparing it to the libraries listed below
Sorting:
- Notes and IoCs of fresh malware☆59Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆114Updated last year
- Really can protect from ransomware encryption?☆46Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- ☆25Updated 2 years ago
- Ransomware simulator written in C#☆37Updated 3 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated last year
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆21Updated 6 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- ☆123Updated last year
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- Just my findings of malwares☆43Updated 2 years ago
- Repository of open source malware here on Github!☆44Updated 3 years ago
- Simple & Customizable DNS Data Exfiltrator☆110Updated 2 years ago
- ☆18Updated 4 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆121Updated 9 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆67Updated last year
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Updated last year
- on-the-fly☆85Updated last year
- ☆66Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- ☆52Updated 2 weeks ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- Resources for AD penetration testing and security☆32Updated 3 years ago
- ☆64Updated 4 years ago