marmos91 / ransomware
A simple demonstration tool to simulate a ransomware attack
☆33Updated last year
Alternatives and similar repositories for ransomware:
Users that are interested in ransomware are comparing it to the libraries listed below
- ☆26Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 11 months ago
- Tools used for Pentesting☆22Updated last year
- Unofficial list of approved tools for OSCP☆15Updated last year
- A user enumeration tool for Slack.☆24Updated 7 months ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆13Updated 5 months ago
- ☆64Updated last year
- VM Lab for security☆9Updated 10 months ago
- Challenge Python☆19Updated last year
- A python based Bot Net Framework☆34Updated 2 weeks ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- SOAPI - The OpenAPI Documentation Scanner☆25Updated 2 weeks ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆19Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆23Updated 2 months ago
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆16Updated 11 months ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆19Updated 2 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 3 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆63Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆14Updated 4 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated 10 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆13Updated 8 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Updated last year
- ☆44Updated 3 weeks ago
- ☆11Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated last year