malvuln / RansomLord
RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware pre-encryption.
☆504Updated 3 months ago
Alternatives and similar repositories for RansomLord:
Users that are interested in RansomLord are comparing it to the libraries listed below
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆717Updated 9 months ago
- ☆310Updated last year
- ☆107Updated 3 months ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆532Updated 2 weeks ago
- The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, ZAP, Nu…☆281Updated last month
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆620Updated this week
- Pen Test Report Generation and Assessment Collaboration☆501Updated last week
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆372Updated 2 weeks ago
- The useful exploit finder☆805Updated 11 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆326Updated 2 weeks ago
- Speed up your pentest enumeration☆83Updated last week
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆115Updated this week
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆557Updated 6 months ago
- ☆159Updated 5 months ago
- ☆209Updated 10 months ago
- Intelligence Blocklists (IPv4). DST = France & Belgium☆232Updated this week
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆508Updated 7 months ago
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆765Updated 6 months ago
- TRACE is a digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆160Updated last month
- Orbit Scanning Software☆352Updated 3 weeks ago
- Identify the accounts most vulnerable to dictionary attacks☆118Updated 7 months ago
- répertoire de publication web public☆44Updated 9 months ago
- secator - the pentester's swiss knife☆977Updated last week
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆368Updated last month
- 🕵️ Unleash Metadata Intelligence with MetaDetective. Your Assistant Beyond Metagoofil.☆355Updated last week
- A resource containing all the tools each ransomware gangs uses☆992Updated last week
- CLI tools for forensic investigation of Windows artifacts☆328Updated 4 months ago
- Threat-hunting tool for Linux☆802Updated last month
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆614Updated 2 weeks ago
- A full stack web application that combines many tools and services for security analysts into a single tool.☆581Updated last month