make your machine look like a sandbox/vm 🤖
☆29Aug 17, 2022Updated 3 years ago
Alternatives and similar repositories for im-a-sandbox
Users that are interested in im-a-sandbox are comparing it to the libraries listed below
Sorting:
- Rust Implementation of SharpDllProxy for DLL Proxying Technique☆29Oct 27, 2022Updated 3 years ago
- A C# utility for interacting with SCOM☆96Dec 2, 2025Updated 3 months ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- ☆13Mar 28, 2024Updated last year
- Code and files specific to the AWS Certified Security - Specialty Exam Prep course☆10Jan 16, 2024Updated 2 years ago
- MCP for reverse engineering☆47Mar 30, 2025Updated 11 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 10 months ago
- PinterCoding University. Author : Gun Gun Febrianza☆11Jun 27, 2020Updated 5 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Random Codes Related to Reverse Engineering☆10Nov 24, 2022Updated 3 years ago
- Blog aggregator for pegelinux community☆10Dec 9, 2022Updated 3 years ago
- This website is used to automatically scan files during CTF.☆13May 31, 2023Updated 2 years ago
- ☆12Oct 10, 2024Updated last year
- Resolve Skype accounts by phone number with API interface☆13Jul 16, 2023Updated 2 years ago
- Detecting fake news articles by analyzing patterns in writing.☆10Mar 30, 2020Updated 5 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- ☆16Aug 25, 2025Updated 6 months ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- A rust crate for parsing, writing and manipulating Android smali files.☆17Jan 14, 2026Updated last month
- eBPF Tools - Tool for monitoring, performance benchmarking and tracing linux kernel☆16Jan 29, 2021Updated 5 years ago
- Frida module utils, writen in typescript☆16Jan 30, 2024Updated 2 years ago
- Various Atlassian Confluence related tools☆19Updated this week
- Python client library for the ClamAV antivirus.☆12May 15, 2025Updated 9 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Conti V3 source code updated☆11Jun 30, 2022Updated 3 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Memory mapping profiles for forensic analysis using volatility 2☆53Sep 23, 2022Updated 3 years ago
- Tutorials written by me.☆48Aug 12, 2021Updated 4 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 9 months ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- exploit for dirtycow☆14Dec 21, 2022Updated 3 years ago
- Python Library for ConfigExtractor☆15Feb 24, 2026Updated last week