A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analysis.
☆437Jan 25, 2025Updated last year
Alternatives and similar repositories for VMwareCloak
Users that are interested in VMwareCloak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆409Jul 4, 2025Updated 10 months ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Vmware Hardened VM detection mitigation loader (anti anti-vm)☆2,271Dec 2, 2022Updated 3 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆230May 13, 2026Updated last week
- An automatic unpacker and logger for DotNet Framework targeting files☆268Aug 23, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Malware Configuration And Payload Extraction☆3,193May 13, 2026Updated last week
- The FLARE team's open-source tool to identify capabilities in executable files.☆6,017Updated this week
- TartarusGate, Bypassing EDRs☆663Jan 25, 2022Updated 4 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 3 years ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆227May 3, 2023Updated 3 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆120Apr 8, 2023Updated 3 years ago
- Windows kernel and user mode emulation.☆1,967Updated this week
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,679Apr 28, 2026Updated 3 weeks ago
- Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that…☆3,902Jun 21, 2024Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆161Apr 6, 2025Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- Practical Windows Forensics Training☆763Feb 16, 2026Updated 3 months ago
- A utility to fix intentionally corrupted UPX packed files.☆93May 22, 2023Updated 3 years ago
- Performing Indirect Clean Syscalls☆612May 2, 2026Updated 2 weeks ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆715May 2, 2026Updated 2 weeks ago
- ☆138Apr 20, 2023Updated 3 years ago
- Sysmon configuration file template with default high-quality event tracing☆590Jan 21, 2026Updated 4 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,408Nov 7, 2024Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆329May 1, 2025Updated last year
- Using fibers to run in-memory code.☆244Oct 19, 2023Updated 2 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- Elastic Security detection content for Endpoint☆1,429May 11, 2026Updated last week
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,665May 3, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,146Jun 10, 2024Updated last year
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 6 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,635Jan 13, 2024Updated 2 years ago
- ☆1,136Dec 19, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- Các IDA Flirt signatures HTC tạo☆21Oct 21, 2024Updated last year
- ☆431Apr 22, 2025Updated last year