bobby-tablez / fake_systeminfoLinks
Generate a fake "systeminfo.exe" binary in order to hide the presence of a VM
☆15Updated 2 years ago
Alternatives and similar repositories for fake_systeminfo
Users that are interested in fake_systeminfo are comparing it to the libraries listed below
Sorting:
- This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.☆11Updated last year
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆76Updated last year
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆39Updated 10 months ago
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆52Updated 5 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆271Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆387Updated 3 weeks ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆63Updated 2 years ago
- Simple PowerShell HTTP Server (no dependencies, single file, PowerShell 5.1/7)☆87Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 3 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆157Updated 6 months ago
- ☆20Updated 11 months ago
- PowerRunAsSystem is a PowerShell script, also available as an installable module through the PowerShell Gallery, designed to impersonate …☆268Updated last year
- A collection of tools, scripts and personal research☆155Updated last week
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆168Updated last week
- A Pentester's Powershell Client☆51Updated 2 months ago
- Windows Exploit Protection Settings (Ultimate) GUI☆74Updated last month
- AppLocker Policy Generator☆25Updated 5 months ago
- An ADCS honeypot to catch attackers in your internal network.☆324Updated last year
- ☆45Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆217Updated 3 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆153Updated last month
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- A repository of credential stealer formats☆243Updated 8 months ago
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Updated 8 months ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated last week
- Venture: Cross-Platform GUI tool for parsing and analyzing Windows event logs☆91Updated last year
- A powershell module for hiding payloads in the pixels of images☆77Updated last year
- A GUI and CLI tool for removing bloat from executables☆441Updated 7 months ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆41Updated 8 months ago