Simulation of Akira Ransomware with Invoke-AtomicTest
☆18Jul 10, 2024Updated last year
Alternatives and similar repositories for simulate-akira
Users that are interested in simulate-akira are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆30Oct 13, 2025Updated 6 months ago
- urlyzer is a URL parsing analysis tool.☆24Jul 27, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆13Jan 26, 2025Updated last year
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆32Oct 7, 2024Updated last year
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Apr 21, 2026Updated 2 weeks ago
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated last month
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆178Aug 13, 2025Updated 8 months ago
- Awesome MalDev Links☆58Apr 28, 2026Updated last week
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆25Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆53Feb 21, 2025Updated last year
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Mar 13, 2025Updated last year
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 6 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A minimalist Hugo theme that helps you build fully responsive documentation websites for small projects.☆10Oct 19, 2021Updated 4 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- ☆44Oct 11, 2023Updated 2 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Detection for CVE-2025-68613☆29Dec 22, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆104Aug 4, 2025Updated 9 months ago
- Source code of paper "EPScan: Automated Detection of Excessive RBAC Permissions in Kubernetes Applications"☆16May 14, 2025Updated 11 months ago
- ☆128Jun 17, 2025Updated 10 months ago
- ☆12Oct 24, 2022Updated 3 years ago
- shellcode transformation tool for YARA evasion☆61Dec 17, 2025Updated 4 months ago
- KQL queries for Incident Response☆14Oct 31, 2023Updated 2 years ago
- Test URL Filtering against a list of sites.☆11Mar 15, 2016Updated 10 years ago
- Living of the Land of Free SaaS☆72Mar 22, 2026Updated last month
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 9 months ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Velociraptor Server hosted in Azure App Service☆58Jun 4, 2025Updated 11 months ago
- This Module Helps to Scan a Commit History of a Repo for Leakage of Secrets☆15Apr 26, 2025Updated last year
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago