d4rksystem / VBoxCloakLinks
A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to evade analysis. Guaranteed to bring down your pafish ratings by at least a few points ;)
☆387Updated 4 months ago
Alternatives and similar repositories for VBoxCloak
Users that are interested in VBoxCloak are comparing it to the libraries listed below
Sorting:
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆412Updated 9 months ago
- A GUI and CLI tool for removing bloat from executables☆431Updated 4 months ago
- Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.☆164Updated 3 years ago
- Somes tools and scripts☆154Updated 4 years ago
- Dynamic unpacker based on PE-sieve☆778Updated 2 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆206Updated last week
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆226Updated last year
- An automatic unpacker and logger for DotNet Framework targeting files☆265Updated 2 years ago
- Repository of Yara Rules☆128Updated 2 weeks ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆199Updated 2 months ago
- ☆513Updated last year
- Microsoft Windows DLL Export Browser (Enumerate Exports, COM Methods and Properties) with Advanced Search Features.☆245Updated last year
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆787Updated last year
- Fileless attack with persistence☆366Updated 4 months ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆688Updated last year
- Assortment of hashing algorithms used in malware☆384Updated 2 weeks ago
- Code snips and notes☆137Updated 3 years ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 4 years ago
- ☆204Updated last week
- Living Off The Land Drivers☆1,327Updated 3 weeks ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆436Updated last year
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆182Updated last month
- This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or …☆289Updated last year
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆469Updated 4 months ago
- ☆379Updated this week
- $MFT directory tree reconstruction & FILE record info☆318Updated last year
- Download from .onion-domains faster.☆220Updated 5 months ago
- A Binary Genetic Traits Lexer Framework☆516Updated 3 months ago
- Memory acquisition for Linux that makes sense.☆214Updated last year