d4rksystem / VBoxCloakLinks
A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to evade analysis. Guaranteed to bring down your pafish ratings by at least a few points ;)
☆294Updated 2 years ago
Alternatives and similar repositories for VBoxCloak
Users that are interested in VBoxCloak are comparing it to the libraries listed below
Sorting:
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆352Updated 4 months ago
- Dynamic unpacker based on PE-sieve☆732Updated last week
- Assortment of hashing algorithms used in malware☆362Updated last week
- A GUI and CLI tool for removing bloat from executables☆398Updated last month
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆180Updated last week
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆750Updated last year
- Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.☆162Updated 2 years ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆165Updated 2 months ago
- A ProcessMonitor visualization application written in rust.☆180Updated last year
- An automatic unpacker and logger for DotNet Framework targeting files☆252Updated last year
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆392Updated 3 weeks ago
- A Binary Genetic Traits Lexer Framework☆494Updated 3 months ago
- Malduck is your ducky companion in malware analysis journeys☆335Updated last month
- Microsoft Windows DLL Export Browser (Enumerate Exports, COM Methods and Properties) with Advanced Search Features.☆222Updated 11 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆637Updated 2 years ago
- Fileless attack with persistence☆354Updated 6 months ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆409Updated 10 months ago
- Living Off The Land Drivers☆1,180Updated 3 weeks ago
- Important notes and topics on my journey towards mastering Windows Internals☆389Updated last year
- Signtool for expired certificates☆477Updated last year
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆740Updated 3 years ago
- A wireshark plugin to instrument ETW☆559Updated 3 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆779Updated 10 months ago
- Repository of Yara Rules☆111Updated last month
- The multi-platform memory acquisition tool.☆797Updated 6 months ago
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆761Updated last week
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆180Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆581Updated last year
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆534Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆537Updated last month