This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
☆290Jul 31, 2024Updated last year
Alternatives and similar repositories for Fake-Sandbox-Artifacts
Users that are interested in Fake-Sandbox-Artifacts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some anti QEMU trick used by in-the-wild malware.☆14Aug 14, 2015Updated 10 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 7 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆444Mar 31, 2026Updated last month
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Collection of various files from infected hosts☆77Mar 22, 2022Updated 4 years ago
- LetMeOutOfYour.net Resources☆21Apr 11, 2026Updated 3 weeks ago
- Standardized Malware Analysis Tool☆56Mar 9, 2021Updated 5 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,943Apr 1, 2026Updated last month
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆437Jan 25, 2025Updated last year
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,288Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 5 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- ☆77Nov 30, 2023Updated 2 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,145Jun 10, 2024Updated last year
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Implant drop-in for EDR testing☆148Nov 15, 2023Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- A Simple Ransomware Vaccine☆977Nov 8, 2023Updated 2 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Formely KMon, a Windows Kernel Driver designed to prevent malware attacks by monitoring the creation of registry keys in common autorun l…☆21Feb 15, 2014Updated 12 years ago
- Petaq - Purple Team Command & Control Server☆104Dec 8, 2022Updated 3 years ago
- Ida pro plugin. The antiVM aims to quickly identify anti-virtual machine and anti-sandbox behavior. This can speed up malware analysis.☆46Sep 2, 2022Updated 3 years ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆333Oct 9, 2021Updated 4 years ago
- InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date…☆591Mar 31, 2026Updated last month
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆128May 25, 2021Updated 4 years ago
- OSED Practice binary☆26Nov 23, 2023Updated 2 years ago