This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.
☆11Jan 3, 2025Updated last year
Alternatives and similar repositories for Windows-Sandbox-Flare-VM
Users that are interested in Windows-Sandbox-Flare-VM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate a fake "systeminfo.exe" binary in order to hide the presence of a VM☆15Jan 4, 2024Updated 2 years ago
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 9 months ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆41Apr 7, 2025Updated 11 months ago
- A Python-based VBScript Code Obfuscator☆46Dec 2, 2025Updated 3 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Apr 6, 2025Updated 11 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆69Mar 19, 2026Updated last week
- T&C and Privacy Policy for our website: https://radicallyopensecurity.com/☆17Dec 9, 2024Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- A framework for TinTin++ using tmux☆12Jul 10, 2016Updated 9 years ago
- Design information for a Max1873, MP26123, and MP26124 laptop battery charger.☆19Jan 20, 2022Updated 4 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Embed a simple and beautiful HTML music player from local audio on your website using MediaElement.js and fast-average-color.☆12Apr 6, 2025Updated 11 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Living off the False Positive!☆42Jan 31, 2025Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Look into EDR events from network☆25Nov 20, 2025Updated 4 months ago
- Embedded Linux Basic☆12Sep 25, 2024Updated last year
- Basic auto click that can be used for almost any idle clicker game!☆11Feb 20, 2023Updated 3 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- Hints for the Kusto Detective Agency - Season 2☆10Aug 15, 2023Updated 2 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆37Mar 16, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- Encrypt your root volume with an OpenPGP smartcard☆16Jul 16, 2025Updated 8 months ago
- ☆18Dec 23, 2024Updated last year
- Resources from the Security Presentation☆13Oct 29, 2024Updated last year
- Linux kernel source tree for Sigma Designs SMP86xx☆15Dec 16, 2016Updated 9 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- HOSTS file to block all known NSA / GCHQ / C.I.A. / F.B.I. spying servers☆19Sep 30, 2016Updated 9 years ago
- Spreading the word of: https://github.com/imrk51/CEH-v11-Study-Guide☆17Nov 3, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Population of PCI devices in the world☆25Mar 12, 2023Updated 3 years ago
- ☆12Oct 29, 2021Updated 4 years ago
- An open source version of a game engine developed by Croteam for the classic Serious Sam games.☆18Jan 15, 2023Updated 3 years ago
- Soldering and rework station with TFT ili9341 display absed on stm32☆25Nov 13, 2024Updated last year
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Legacy Sigma Tools (sigmac etc.)☆16May 7, 2023Updated 2 years ago
- CVE-2018-9276 PRTG < 18.2.39 Reverse Shell (Python3 support)☆20Dec 22, 2022Updated 3 years ago