marmos91 / ransomware
A simple demonstration tool to simulate a ransomware attack
☆34Updated last year
Alternatives and similar repositories for ransomware:
Users that are interested in ransomware are comparing it to the libraries listed below
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- Unofficial list of approved tools for OSCP☆14Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆114Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated 3 weeks ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 4 months ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆19Updated 2 years ago
- Tool for enumerating Active Directory environments☆46Updated last year
- Packet Analysis on Steroids☆10Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆16Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆11Updated last year
- List of Command&Control (C2) software☆34Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆40Updated last year
- on-the-fly☆83Updated 10 months ago
- ☆34Updated last year
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 11 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 7 months ago
- ☆78Updated 10 months ago
- ☆34Updated last year
- ☆24Updated 3 weeks ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 11 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- Timestomp Tool to flatten MAC times with a specific timestamp☆45Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated 11 months ago
- ☆41Updated 2 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year