RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware pre-encryption.
☆514Jun 20, 2025Updated 10 months ago
Alternatives and similar repositories for RansomLord
Users that are interested in RansomLord are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,022Mar 21, 2025Updated last year
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆758Feb 1, 2026Updated 2 months ago
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆441Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆728Apr 2, 2026Updated 2 weeks ago
- secator - the pentester's swiss knife☆1,265Updated this week
- An offensive data enrichment pipeline☆949Apr 2, 2026Updated 2 weeks ago
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆814Sep 3, 2024Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,327Updated this week
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆206Nov 23, 2025Updated 4 months ago
- ☆569Mar 28, 2024Updated 2 years ago
- Python tool to check rootkits in Windows kernel☆210Aug 20, 2025Updated 7 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- ☆319Mar 26, 2024Updated 2 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,186Mar 28, 2025Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆29Apr 22, 2023Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Open-source security automation platform for teams and AI agents☆3,551Updated this week
- EDR Lab for Experimentation Purposes☆1,427Mar 1, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,278Jul 18, 2024Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆152May 7, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆869Feb 3, 2024Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,166Mar 8, 2026Updated last month
- Send phishing messages and attachments to Microsoft Teams users☆1,114Jun 19, 2024Updated last year
- Malware vulnerability intel tool for third-party attackers☆121Oct 24, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,312Feb 15, 2026Updated 2 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆688Oct 23, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Live Feed of C2 servers, tools, and botnets☆772Apr 13, 2026Updated last week
- ☆11Jun 12, 2023Updated 2 years ago
- ☆1,803Aug 30, 2024Updated last year
- Automation tool for Windows Deception Host Burn-In☆85Dec 4, 2024Updated last year
- Threat-hunting tool for Linux☆1,053Updated this week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,849Nov 3, 2024Updated last year
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆250Jul 8, 2025Updated 9 months ago