This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
☆289Jul 31, 2024Updated last year
Alternatives and similar repositories for Fake-Sandbox-Artifacts
Users that are interested in Fake-Sandbox-Artifacts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some anti QEMU trick used by in-the-wild malware.☆14Aug 14, 2015Updated 10 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆445Jul 10, 2024Updated last year
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Collection of various files from infected hosts☆77Mar 22, 2022Updated 4 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Standardized Malware Analysis Tool☆56Mar 9, 2021Updated 5 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,887Mar 1, 2026Updated 3 weeks ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆430Jan 25, 2025Updated last year
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,282Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 4 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- ☆76Nov 30, 2023Updated 2 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,117Jun 10, 2024Updated last year
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Implant drop-in for EDR testing☆147Nov 15, 2023Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- A Simple Ransomware Vaccine☆974Nov 8, 2023Updated 2 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Formely KMon, a Windows Kernel Driver designed to prevent malware attacks by monitoring the creation of registry keys in common autorun l…☆21Feb 15, 2014Updated 12 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- Ida pro plugin. The antiVM aims to quickly identify anti-virtual machine and anti-sandbox behavior. This can speed up malware analysis.☆44Sep 2, 2022Updated 3 years ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆333Oct 9, 2021Updated 4 years ago
- InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date…☆590Apr 5, 2022Updated 3 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆129May 25, 2021Updated 4 years ago
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year