securekomodo / RansomwareSimulatorLinks
Powershell script to emulate the "blast radius" of a ransomware infection.
☆28Updated 4 years ago
Alternatives and similar repositories for RansomwareSimulator
Users that are interested in RansomwareSimulator are comparing it to the libraries listed below
Sorting:
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- This repo is dedicated to a powerpoint exploit☆34Updated 4 years ago
- BloodHound Data Scanner☆45Updated 5 years ago
- A tool for auditing network shares in an Active Directory environment☆42Updated 6 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 4 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆14Updated 4 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Machine Learning Network Share Password Hunting Toolkit☆127Updated 5 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- ☆56Updated 5 years ago
- Threat Mitigation Strategies☆25Updated 2 years ago
- blame Huy☆42Updated 4 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 3 years ago
- ☆42Updated 4 years ago
- Active Directory Toolkit☆20Updated 6 years ago
- ☆77Updated last month
- MimeCast Password Spraying Tool☆47Updated 5 years ago
- ☆41Updated 6 years ago
- Password Spraying Framework☆63Updated 3 years ago
- My Python Cookiecutter project template☆31Updated 2 years ago