NavyTitanium / Fake-Sandbox-ArtifactsView external linksLinks
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
☆288Jul 31, 2024Updated last year
Alternatives and similar repositories for Fake-Sandbox-Artifacts
Users that are interested in Fake-Sandbox-Artifacts are comparing it to the libraries listed below
Sorting:
- Work in Progress repo☆15Apr 18, 2019Updated 6 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Collection of various files from infected hosts☆77Mar 22, 2022Updated 3 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- wordlists for password cracking☆28Aug 15, 2022Updated 3 years ago
- Automatically create YARA rules from malicious documents.☆212May 16, 2022Updated 3 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆441Jul 10, 2024Updated last year
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Some anti QEMU trick used by in-the-wild malware.☆14Aug 14, 2015Updated 10 years ago
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 4 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- Sources code extracted from malwares for analysis☆41Mar 10, 2023Updated 2 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆102Mar 3, 2021Updated 4 years ago
- Standardized Malware Analysis Tool☆56Mar 9, 2021Updated 4 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆226May 1, 2021Updated 4 years ago
- Silencing Sysmon via driver unload☆235Oct 13, 2022Updated 3 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Autopsy Module to analyze Registry Hives☆15Feb 18, 2022Updated 3 years ago
- Active Directory Purple Team Playbook☆115May 8, 2023Updated 2 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆130May 25, 2021Updated 4 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,849Feb 1, 2026Updated 2 weeks ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- Different code-injections techniques under a common tool☆30May 3, 2020Updated 5 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,263Updated this week
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.☆16Mar 18, 2021Updated 4 years ago
- Experiment on reproducing Obfuscate & Sleep☆161Mar 14, 2021Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Jul 7, 2020Updated 5 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Jan 14, 2022Updated 4 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago