Phirautee
Ransomware demo
A proof of concept ransomware tool demonstrating the use of Living off the Land (LotL) tactics to spread user awareness about attacks and implications of ransomwares.
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
117 stars
17 watching
29 forks
Language: PowerShell
last commit: over 4 years ago hacking-toolpentestpocransomware
Related projects:
Repository | Description | Stars |
---|---|---|
viralmaniar/murmurhash | Tools for detecting phishing websites by analyzing favicon hashes and searching on Shodan | 114 |
pentestgeek/phishing-frenzy | A Ruby on Rails tool used to simulate phishing attacks and test email security vulnerabilities | 794 |
viralmaniar/remote-desktop-caching- | Reconstructs and recovers old RDP session information from broken PNG files. | 208 |
hasherezade/persistence_demos | Demonstrates various persistence methods used by malware | 219 |
arthepsy/cve-2021-4034 | A proof-of-concept demonstrating local privilege escalation in a specific vulnerability | 1,056 |
claroty/arya | A tool that generates custom-made files to trigger YARA rules and mimic malware behavior. | 239 |
phra/rustbuster | A tool that uses web fuzzing and content discovery techniques to test websites for vulnerabilities | 527 |
quentinhardy/scriptsandexploits | Exploits a known vulnerability in Oracle WebLogic to execute arbitrary code | 142 |
phra/pezor | A tool for obfuscating and packing executable files to evade antivirus detection and security measures | 1,856 |
mertdas/privkit | A tool designed to detect and identify potential privilege escalation vulnerabilities on Windows systems through configuration mischecks. | 365 |
yyzpiero/rl4redteam | An agent trained to scan for vulnerabilities and exploit them in a simulated network environment | 22 |
johnnykv/heralding | A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 376 |
mstxq17/cve-2021-1675_rdl_lpe | A tool exploiting a vulnerability to bypass security measures by loading a malicious DLL into memory. | 147 |
virustotal/yara | A tool for creating pattern matching rules to identify and classify malware samples | 8,316 |
pr0xylife/emotet | A collection of indicators of compromise related to a malware family used for financial crimes and other malicious activities | 55 |