marmos91 / ransomware
A simple demonstration tool to simulate a ransomware attack
β36Updated last year
Alternatives and similar repositories for ransomware:
Users that are interested in ransomware are comparing it to the libraries listed below
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hashβ50Updated 5 months ago
- Collection of extra pentest tools for Kali Linuxβ103Updated last year
- It was developed to speed up the processes of SOC Analysts during analysisβ48Updated last year
- Ransomware Simulator for testing Blue Team Detectionsβ37Updated 2 years ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practiceβ26Updated 4 months ago
- on-the-flyβ84Updated 11 months ago
- Script for importing Nmap results into a Neo4j Graph Databaseβ20Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and Aβ¦β19Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.β39Updated last year
- Modular framework to exploit UPS devicesβ63Updated 2 years ago
- A collection of Script for Red Team & Incidence Responseβ11Updated 2 years ago
- β34Updated last year
- β12Updated last week
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.β39Updated 9 months ago
- Google Meet Phishing Template For Gophishβ45Updated 2 years ago
- β19Updated 3 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on Lβ¦β24Updated 4 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.β119Updated last year
- β24Updated last month
- β47Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious filesβ26Updated 2 years ago
- Extract credentials and other useful info from network capturesβ68Updated 2 years ago
- Hive v5 file decryption algorithmβ34Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if yβ¦β99Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.β41Updated last year
- OMLASP (Ideas Locas)β22Updated 2 years ago
- β23Updated 3 months ago
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.β50Updated 3 weeks ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicatedβ¦β24Updated 2 years ago