th3r4ven / R4VENRansomwareLinks
Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida
☆10Updated 4 years ago
Alternatives and similar repositories for R4VENRansomware
Users that are interested in R4VENRansomware are comparing it to the libraries listed below
Sorting:
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated 2 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integr…☆12Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- ☆35Updated last year
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆15Updated last year
- A Red Teaming tool focused on profiling the target.☆27Updated last month
- Simulate Windows EXE for Malware Research!☆18Updated 11 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆20Updated 2 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆18Updated 3 weeks ago
- ADDS (Active Directory Domain Services)☆28Updated 2 years ago
- ☆30Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆32Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago