NCC Group Ransomware Simulator
☆69Jul 7, 2016Updated 9 years ago
Alternatives and similar repositories for ransomware-simulator
Users that are interested in ransomware-simulator are comparing it to the libraries listed below
Sorting:
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- pan-stix☆19Oct 12, 2017Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Fileless Ransomware Example☆38Aug 2, 2017Updated 8 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆21Jan 19, 2015Updated 11 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆114Dec 19, 2020Updated 5 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 2 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- Fraktal's Ransomware Emulator☆101Apr 5, 2024Updated last year
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Mar 20, 2019Updated 6 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- ☆11May 2, 2022Updated 3 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- Windows DPAPI laboratory☆12Mar 5, 2018Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Ghidra script which fully parses COFF files☆12Oct 18, 2024Updated last year
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- A Beacon Object File (BOF) implementation of the 'cat' command☆26Feb 11, 2023Updated 3 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Windows Share Enumerator☆129Nov 1, 2018Updated 7 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- Pentoo installer rewritten by Wuodan to be more modular☆11Jan 9, 2026Updated last month
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago