Powershell sandboxing utility
☆19Mar 2, 2026Updated last month
Alternatives and similar repositories for box-ps
Users that are interested in box-ps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- A tool for studying JavaScript malware.☆15Updated this week
- ☆17Mar 31, 2026Updated 2 weeks ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 13 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Jupyter notebooks for threat hunting☆60Apr 7, 2026Updated last week
- ☆60Jun 24, 2023Updated 2 years ago
- Some of my Malware Analysis writeups☆51Oct 3, 2025Updated 6 months ago
- ☆29May 25, 2021Updated 4 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆77Dec 29, 2025Updated 3 months ago
- Just another useless C2 occupying space in some HDD somewhere.☆22Jul 4, 2023Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- ☆28Oct 15, 2025Updated 6 months ago
- This repository contains files from AppGate / Immunity Malware Analysis Team.☆21Oct 19, 2021Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- ☆153Dec 6, 2018Updated 7 years ago
- ☆33Feb 3, 2026Updated 2 months ago
- Web interface and APIs for Assemblyline 4☆21Updated this week
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Full of public notes and Utilities☆133Jan 6, 2026Updated 3 months ago
- BlackBerry Threat Research & Intelligence☆97Oct 20, 2023Updated 2 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Apr 7, 2026Updated last week
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Recordization library☆11Apr 8, 2026Updated last week
- Xavier Framework is a user interface wrapper built on top of the Volatility(c) memory forensics framework.☆46Jul 7, 2022Updated 3 years ago
- ☆14Jun 2, 2025Updated 10 months ago
- BinjaryNinja plugin for a ShellStorm like assembly/disassembly experience☆17Nov 28, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆51Sep 22, 2025Updated 6 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Jun 10, 2022Updated 3 years ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 6 years ago
- Enumerate S3 buckets via certstream, domain, or keywords☆15Feb 27, 2018Updated 8 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago