RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware pre-encryption.
☆516Jun 20, 2025Updated 9 months ago
Alternatives and similar repositories for RansomLord
Users that are interested in RansomLord are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,021Mar 21, 2025Updated last year
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆757Feb 1, 2026Updated last month
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆438Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆730Feb 14, 2026Updated last month
- secator - the pentester's swiss knife☆1,249Mar 21, 2026Updated last week
- An offensive data enrichment pipeline☆944Mar 19, 2026Updated last week
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆810Sep 3, 2024Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,316Updated this week
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 4 months ago
- ☆569Mar 28, 2024Updated last year
- Python tool to check rootkits in Windows kernel☆207Aug 20, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- ☆318Mar 26, 2024Updated 2 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,179Mar 28, 2025Updated 11 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- The AI automation platform built for security teams and agents.☆3,539Updated this week
- EDR Lab for Experimentation Purposes☆1,427Mar 1, 2026Updated 3 weeks ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,276Jul 18, 2024Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154May 7, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆866Feb 3, 2024Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,157Mar 8, 2026Updated 2 weeks ago
- Send phishing messages and attachments to Microsoft Teams users☆1,113Jun 19, 2024Updated last year
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,279Feb 15, 2026Updated last month
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆677Oct 23, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Live Feed of C2 servers, tools, and botnets☆760Updated this week
- ☆11Jun 12, 2023Updated 2 years ago
- ☆1,800Aug 30, 2024Updated last year
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆235Jul 8, 2025Updated 8 months ago
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Threat-hunting tool for Linux☆1,047Mar 16, 2026Updated last week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,831Nov 3, 2024Updated last year