Powershell sandboxing utility
☆20Feb 2, 2026Updated last month
Alternatives and similar repositories for box-ps
Users that are interested in box-ps are comparing it to the libraries listed below
Sorting:
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆17Jan 21, 2026Updated last month
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Jupyter notebooks for threat hunting☆60Mar 26, 2025Updated 11 months ago
- A tool for studying JavaScript malware.☆15Updated this week
- ☆61Jun 24, 2023Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- Some of my Malware Analysis writeups☆47Oct 3, 2025Updated 5 months ago
- ☆28Oct 15, 2025Updated 4 months ago
- Xavier Framework is a user interface wrapper built on top of the Volatility(c) memory forensics framework.☆46Jul 7, 2022Updated 3 years ago
- Code files for CSD 310☆15Aug 19, 2023Updated 2 years ago
- This repository contains files from AppGate / Immunity Malware Analysis Team.☆21Oct 19, 2021Updated 4 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- ☆154Dec 6, 2018Updated 7 years ago
- Full of public notes and Utilities☆131Jan 6, 2026Updated last month
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- A triage data collection script for macOS☆29Nov 27, 2020Updated 5 years ago
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆77Dec 29, 2025Updated 2 months ago
- ☆28May 25, 2021Updated 4 years ago
- Mine patterns from logs☆27Dec 12, 2016Updated 9 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- Writeups for CTF challenges☆35Nov 12, 2023Updated 2 years ago
- Quick Cache and Archive search buttons☆39May 11, 2024Updated last year
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- My favorite resources and tools for malware analysis.☆43Aug 18, 2020Updated 5 years ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆51Sep 22, 2025Updated 5 months ago
- Various capabilities for static malware analysis.☆80Sep 4, 2024Updated last year
- Google Custom Search Engines for searching in code repositories☆36Mar 26, 2024Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆43Feb 9, 2025Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 11 months ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago