marktsec / Ransomware_Official_DomainsLinks
List Of Ransomware Groups Official WebSites
☆141Updated last week
Alternatives and similar repositories for Ransomware_Official_Domains
Users that are interested in Ransomware_Official_Domains are comparing it to the libraries listed below
Sorting:
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆224Updated 5 months ago
- Lockbit, URSIF, BlackBasta etc.☆219Updated 3 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆222Updated 9 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- ☆306Updated last year
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆215Updated 2 months ago
- PowerShell Obfuscator☆225Updated 4 months ago
- A collection of intel and usernames scraped from various cybercrime sources & forums. DarkForums, HackForums, Patched, Cracked, BreachFor…☆135Updated last week
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Information stealer logs parser☆91Updated last year
- ☆44Updated last year
- CVE-2025-49144 PoC for security researchers to test and try.☆85Updated 6 months ago
- Just some lists of Malware Configs☆173Updated last year
- ☆140Updated last year
- A RedTeam Toolkit☆409Updated 5 months ago
- ☆124Updated last year
- The Havoc Framework☆63Updated 3 years ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆227Updated 9 months ago
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆295Updated 2 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆429Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆347Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.☆221Updated 3 months ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆126Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year