01Generates multi-phase ransomware scenarios based on real-world threat actor TTPs
02Provides structured injects for double extortion, regulatory deadlines, and data leaks
03Aligns organizational responses with NIST CSF and CISA ransomware readiness standards
04Facilitates decision-making evaluations for ransom payments and public disclosure
050 GitHub stars
06Produces standardized After-Action Reports (AAR) with gap analysis and remediation plans