A collection of scripts to initialize a windows VM to run all the malwares!
☆107Apr 3, 2020Updated 5 years ago
Alternatives and similar repositories for VM_Setup
Users that are interested in VM_Setup are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,043Aug 23, 2021Updated 4 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Aug 7, 2015Updated 10 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Jul 10, 2024Updated last year
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107May 22, 2020Updated 5 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Mar 31, 2014Updated 11 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- [Windows] Local Privilege Escalation - WebClient☆59May 15, 2017Updated 8 years ago
- ☆30May 23, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- FAME Automates Malware Evaluation☆931Dec 16, 2025Updated 3 months ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Windows Live Artifacts Acquisition Script☆190Jun 20, 2022Updated 3 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- ☆46Apr 6, 2017Updated 8 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆304Jan 12, 2023Updated 3 years ago
- Powershell-based Windows Security Auditing Toolbox☆574Jan 9, 2019Updated 7 years ago
- Malware static analysis framework☆185Apr 1, 2020Updated 5 years ago
- Elevation by environment variable expansion☆64Nov 24, 2016Updated 9 years ago