NavyTitanium / Fake-Sandbox-ArtifactsLinks
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
☆272Updated 10 months ago
Alternatives and similar repositories for Fake-Sandbox-Artifacts
Users that are interested in Fake-Sandbox-Artifacts are comparing it to the libraries listed below
Sorting:
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆356Updated 4 months ago
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆294Updated 2 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆426Updated 3 weeks ago
- Malduck is your ducky companion in malware analysis journeys☆335Updated last month
- Collection of private Yara rules.☆354Updated last month
- Dynamic unpacker based on PE-sieve☆732Updated last week
- Encyclopedia for Executables☆444Updated 3 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆588Updated this week
- Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.☆162Updated 2 years ago
- c2 traffic☆188Updated 2 years ago
- Malware repository component for samples & static configuration with REST API interface.☆355Updated last month
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆375Updated 3 years ago
- ☆148Updated last year
- Live hunting of code injection techniques☆382Updated 5 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆179Updated 4 months ago
- A guide on how to write fast and memory friendly YARA rules☆144Updated 3 months ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆409Updated 10 months ago
- Automatic YARA rule generation for Malpedia☆160Updated 2 years ago
- A wireshark plugin to instrument ETW☆559Updated 3 years ago
- InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date…☆563Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆581Updated last year
- "Screwed Drivers" centralized information source for code references, links, etc.☆357Updated 5 years ago
- A golang CLI tool to download malware from a variety of sources.☆146Updated last year
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆750Updated last year
- MBC content in markdown☆453Updated 2 months ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆740Updated 3 years ago
- Collection of rules created using YARA-Signator over Malpedia☆129Updated 6 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆96Updated 2 weeks ago
- For all these times you're asking yourself "what is this panel again?"☆255Updated 2 years ago
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆140Updated last year