NavyTitanium / Fake-Sandbox-Artifacts
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
☆269Updated 8 months ago
Alternatives and similar repositories for Fake-Sandbox-Artifacts:
Users that are interested in Fake-Sandbox-Artifacts are comparing it to the libraries listed below
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆347Updated 3 months ago
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆294Updated 2 years ago
- Encyclopedia for Executables☆439Updated 3 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆574Updated last month
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆578Updated 11 months ago
- Dynamic unpacker based on PE-sieve☆727Updated last month
- ☆489Updated last year
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆740Updated last year
- Detection in the form of Yara, Snort and ClamAV signatures.☆224Updated 5 months ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆737Updated 3 years ago
- Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.☆158Updated 2 years ago
- Malduck is your ducky companion in malware analysis journeys☆329Updated this week
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆405Updated 9 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆96Updated last week
- Collection of private Yara rules.☆353Updated last week
- High Octane Triage Analysis☆722Updated this week
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆175Updated this week
- Lnk Explorer Command line edition!!☆300Updated 3 months ago
- A guide on how to write fast and memory friendly YARA rules☆142Updated 2 months ago
- An index of Windows binaries, including download links for executables such as exe, dll and sys files☆650Updated this week
- ☆146Updated 10 months ago
- c2 traffic☆188Updated 2 years ago
- InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date…☆555Updated 3 years ago
- Volatility plugin for extracts configuration data of known malware☆486Updated last year
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆180Updated 3 years ago
- Living Off The Land Drivers☆1,153Updated 3 weeks ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 2 years ago
- Event Tracing For Windows (ETW) Resources☆375Updated 6 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆415Updated 3 weeks ago
- Collection of rules created using YARA-Signator over Malpedia☆128Updated 5 months ago