NavyTitanium / Fake-Sandbox-ArtifactsLinks
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
☆288Updated last year
Alternatives and similar repositories for Fake-Sandbox-Artifacts
Users that are interested in Fake-Sandbox-Artifacts are comparing it to the libraries listed below
Sorting:
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆394Updated 6 months ago
- Encyclopedia for Executables☆466Updated 4 years ago
- Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.☆165Updated 3 years ago
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆424Updated last year
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆184Updated 3 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆97Updated 3 weeks ago
- A wireshark plugin to instrument ETW☆579Updated 4 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆587Updated last year
- Detection in the form of Yara, Snort and ClamAV signatures.☆247Updated last year
- A guide on how to write fast and memory friendly YARA rules☆162Updated 11 months ago
- Collection of private Yara rules.☆378Updated this week
- ☆150Updated last year
- Malduck is your ducky companion in malware analysis journeys☆349Updated 7 months ago
- InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date…☆579Updated 3 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Updated 3 years ago
- Collection of rules created using YARA-Signator over Malpedia☆143Updated 3 weeks ago
- A tool designed to make physical devices detectable by malware and make system look like virtual machine.☆397Updated 5 years ago
- $MFT directory tree reconstruction & FILE record info☆324Updated last year
- Lnk Explorer Command line edition!!☆334Updated last year
- Dynamic unpacker based on PE-sieve☆795Updated 4 months ago
- Extract AutoIt scripts embedded in PE binaries☆216Updated last year
- Windows x64 handcrafted token stealing kernel-mode shellcode☆510Updated last year
- A GUI and CLI tool for removing bloat from executables☆440Updated 6 months ago
- Code snips and notes☆140Updated 3 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆277Updated this week
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆671Updated 3 weeks ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆144Updated this week
- Malware Sandboxes & Malware Source☆108Updated 8 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆226Updated 4 years ago
- Regipy is an os independent python library for parsing offline registry hives☆266Updated last week