NavyTitanium / Fake-Sandbox-ArtifactsLinks
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
☆287Updated last year
Alternatives and similar repositories for Fake-Sandbox-Artifacts
Users that are interested in Fake-Sandbox-Artifacts are comparing it to the libraries listed below
Sorting:
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆393Updated 6 months ago
- Encyclopedia for Executables☆465Updated 4 years ago
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆424Updated 11 months ago
- Collection of private Yara rules.☆375Updated 3 weeks ago
- Detection in the form of Yara, Snort and ClamAV signatures.☆246Updated last year
- Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.☆165Updated 3 years ago
- Dynamic unpacker based on PE-sieve☆791Updated 3 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆584Updated last year
- A guide on how to write fast and memory friendly YARA rules☆162Updated 10 months ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆183Updated 3 months ago
- Malware Sandboxes & Malware Source☆106Updated 8 years ago
- A wireshark plugin to instrument ETW☆578Updated 3 years ago
- A GUI and CLI tool for removing bloat from executables☆437Updated 6 months ago
- InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date…☆578Updated 3 years ago
- A tool designed to make physical devices detectable by malware and make system look like virtual machine.☆398Updated 5 years ago
- Malduck is your ducky companion in malware analysis journeys☆348Updated 6 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆97Updated last week
- $MFT directory tree reconstruction & FILE record info☆323Updated last year
- A golang CLI tool to download malware from a variety of sources.☆151Updated 6 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆663Updated last week
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆436Updated last year
- ☆150Updated last year
- Code snips and notes☆140Updated 3 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆387Updated 3 years ago
- Extract AutoIt scripts embedded in PE binaries☆216Updated last year
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆144Updated 3 weeks ago
- Collection of rules created using YARA-Signator over Malpedia☆142Updated last year
- Lnk Explorer Command line edition!!☆333Updated 11 months ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,253Updated 3 weeks ago
- Assortment of hashing algorithms used in malware☆387Updated 2 months ago