A simple demonstration tool to simulate a ransomware attack
☆42Mar 17, 2026Updated last week
Alternatives and similar repositories for ransomware
Users that are interested in ransomware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆16Mar 12, 2023Updated 3 years ago
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆18Feb 22, 2024Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A vet analyzer which checks sql queries for correctness☆10Feb 27, 2019Updated 7 years ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆32Mar 15, 2022Updated 4 years ago
- This script and accompanying files will allow system administrators to automatically deploy Microsoft Local Administrator Password Soluti…☆13Aug 18, 2017Updated 8 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 5 months ago
- SilverTGOSINT is a Telegram OSINT tool that collects messages from target users in Telegram groups and tracks users who extract data from…☆52May 1, 2025Updated 10 months ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- 🚀 The easiest way to automate building and releasing your iOS and Android apps☆11Mar 11, 2026Updated 2 weeks ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 4 months ago
- Exim transport_filter python script that puts a user's RID value where a macro can see it for GoPhish attachment phishing tests☆21Jul 19, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- My Reverse Shell Cheat Sheet☆13Mar 2, 2022Updated 4 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- Port scanner in bash☆16Nov 8, 2013Updated 12 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Jan 23, 2025Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Docile go version manager☆13Oct 24, 2022Updated 3 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆29Jul 4, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- The Ranflood ransomware contrast tool☆18Dec 18, 2024Updated last year
- اداة لاقفال ترمكس بكلمة مرور☆14Aug 5, 2022Updated 3 years ago
- Camera Hack bot - Powered by XPH4N70M☆25May 26, 2023Updated 2 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Feb 26, 2022Updated 4 years ago
- ☆23Apr 22, 2020Updated 5 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 11 months ago