andreiverse / im-a-sandboxLinks
make your machine look like a sandbox/vm π€
β29Updated 3 years ago
Alternatives and similar repositories for im-a-sandbox
Users that are interested in im-a-sandbox are comparing it to the libraries listed below
Sorting:
- A tool to dump exposed .git repositoriesβ72Updated 5 months ago
 - All kinds of tiny shellsβ58Updated 2 years ago
 - β233Updated 3 years ago
 - Nuke It From Orbit - remove AV/EDR with physical accessβ267Updated 10 months ago
 - Wordlist to crack .zip-file passwordβ206Updated 3 years ago
 - Collection of steganography tools for images and textβ42Updated last year
 - A targeted DNS cache poisonerβ124Updated 3 years ago
 - StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enoughβ86Updated 4 years ago
 - Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptinβ¦β122Updated 10 months ago
 - Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.β113Updated 3 months ago
 - A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.β41Updated last year
 - Crappy Golang code to list local listening ports and their associated processes.β32Updated 2 years ago
 - The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.β139Updated last year
 - Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedroβ77Updated 6 months ago
 - β27Updated 2 weeks ago
 - β45Updated 4 years ago
 - The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.β314Updated last year
 - This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.β99Updated 2 months ago
 - Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β197Updated 2 weeks ago
 - A PoC ransomware sample to test out your ransomware response strategy.β212Updated 6 months ago
 - Command line client for HackTheBoxβ23Updated last year
 - Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLsβ¦β57Updated last month
 - Markov Model libraries, optimized for cracking-focused password generations.β111Updated 4 years ago
 - TLS & SNI aware netcatβ48Updated last year
 - Security Information and Event Management in Minecraftβ120Updated 3 years ago
 - A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.β137Updated last year
 - An Ansible role that runs Vulhub environments on a Linux system.β19Updated 2 weeks ago
 - Using Discord as a C2 - Proof of Conceptβ61Updated 2 years ago
 - This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.β18Updated 3 months ago
 - Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.β70Updated 11 months ago