Powershell script to emulate the "blast radius" of a ransomware infection.
☆28Jul 27, 2021Updated 4 years ago
Alternatives and similar repositories for RansomwareSimulator
Users that are interested in RansomwareSimulator are comparing it to the libraries listed below
Sorting:
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆42Sep 3, 2020Updated 5 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Jul 21, 2021Updated 4 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Jan 19, 2021Updated 5 years ago
- Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)☆20Feb 16, 2021Updated 5 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Jul 12, 2021Updated 4 years ago
- ☆15Oct 29, 2024Updated last year
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated last year
- ☆18Jul 24, 2019Updated 6 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- ☆23May 28, 2021Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- ☆34Jul 6, 2024Updated last year
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- A distributed data flow and computation system that runs on transactional messaging infrastructure☆11Oct 22, 2022Updated 3 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- NTLM/Negotiate authentication over HTTP that supports Pass The Hash Mode (PtH)☆17Sep 13, 2024Updated last year
- ☆19Nov 26, 2020Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Example application for creating multiple desktops on Windows☆140Jun 8, 2018Updated 7 years ago
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- Resources needed for PR crisis WordPress microsite☆13Mar 16, 2021Updated 5 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Dec 10, 2015Updated 10 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- rtsp for humans☆12Nov 25, 2014Updated 11 years ago
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago