A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to evade analysis. Guaranteed to bring down your pafish ratings by at least a few points ;)
☆407Jul 4, 2025Updated 9 months ago
Alternatives and similar repositories for VBoxCloak
Users that are interested in VBoxCloak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆435Jan 25, 2025Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 3 years ago
- Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that…☆3,879Jun 21, 2024Updated last year
- An automatic unpacker and logger for DotNet Framework targeting files☆266Aug 23, 2023Updated 2 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Malware Configuration And Payload Extraction☆3,133Updated this week
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Jun 30, 2023Updated 2 years ago
- ☆38Apr 7, 2023Updated 3 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆132Nov 25, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Script to create templates to use with VirtualBox to make vm detection harder☆770Nov 5, 2022Updated 3 years ago
- Aims to identify sleeping beacons☆664Jan 25, 2026Updated 2 months ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RegStrike is a .reg payload generator☆57Sep 19, 2023Updated 2 years ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆226May 3, 2023Updated 2 years ago
- A dynamic unpacking tool☆152Sep 17, 2023Updated 2 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote m…☆173Apr 27, 2023Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆388Jul 30, 2024Updated last year
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Sep 19, 2022Updated 3 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆372Dec 24, 2021Updated 4 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,948Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ETW based POC to identify direct and indirect syscalls☆191Apr 19, 2023Updated 3 years ago
- Malduck is your ducky companion in malware analysis journeys☆350Jun 22, 2025Updated 9 months ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆306Aug 2, 2023Updated 2 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- Now You See Me, Now You Don't☆1,042Jan 23, 2026Updated 2 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- Deleting Shadow Copies In Pure C++☆120Oct 31, 2022Updated 3 years ago
- Credential Guard Bypass Via Patching Wdigest Memory☆337Feb 3, 2023Updated 3 years ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 7 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Dynamic unpacker based on PE-sieve☆808Updated this week
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆123Jul 12, 2024Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Oct 16, 2023Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆43Sep 21, 2023Updated 2 years ago