marmos91 / ransomware
A simple demonstration tool to simulate a ransomware attack
☆37Updated last year
Alternatives and similar repositories for ransomware:
Users that are interested in ransomware are comparing it to the libraries listed below
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 6 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆14Updated 6 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆12Updated 2 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 10 months ago
- ☆31Updated 3 weeks ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated last year
- Tool for enumerating Active Directory environments☆46Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆38Updated 2 months ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Tools and Resources for Physical Security Red Teaming☆31Updated 3 weeks ago
- Scripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited☆16Updated 3 years ago
- A user enumeration tool for Slack.☆28Updated 10 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆28Updated 10 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆14Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆37Updated 3 weeks ago
- A series of python scripts to extract information from Dark Web Applications☆12Updated last month
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆24Updated 2 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆13Updated 2 years ago
- Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integr…☆12Updated 10 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 9 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- ☆32Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆13Updated 6 months ago