A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analysis.
☆434Jan 25, 2025Updated last year
Alternatives and similar repositories for VMwareCloak
Users that are interested in VMwareCloak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆408Jul 4, 2025Updated 9 months ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Vmware Hardened VM detection mitigation loader (anti anti-vm)☆2,247Dec 2, 2022Updated 3 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆222Apr 22, 2026Updated last week
- An automatic unpacker and logger for DotNet Framework targeting files☆267Aug 23, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Malware Configuration And Payload Extraction☆3,165Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,982Updated this week
- TartarusGate, Bypassing EDRs☆662Jan 25, 2022Updated 4 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 3 years ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆226May 3, 2023Updated 2 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆119Apr 8, 2023Updated 3 years ago
- Windows kernel and user mode emulation.☆1,949Apr 8, 2026Updated 3 weeks ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,593Mar 20, 2026Updated last month
- Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that…☆3,888Jun 21, 2024Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Apr 6, 2025Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- Practical Windows Forensics Training☆764Feb 16, 2026Updated 2 months ago
- A utility to fix intentionally corrupted UPX packed files.☆93May 22, 2023Updated 2 years ago
- Performing Indirect Clean Syscalls☆611Apr 19, 2023Updated 3 years ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 7 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆706Apr 21, 2026Updated last week
- ☆138Apr 20, 2023Updated 3 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆327May 1, 2025Updated last year
- Sysmon configuration file template with default high-quality event tracing☆588Jan 21, 2026Updated 3 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,407Nov 7, 2024Updated last year
- Using fibers to run in-memory code.☆244Oct 19, 2023Updated 2 years ago
- Elastic Security detection content for Endpoint☆1,421Updated this week
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,646Apr 18, 2026Updated 2 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,141Jun 10, 2024Updated last year
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 5 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,630Jan 13, 2024Updated 2 years ago
- ☆1,134Dec 19, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- Các IDA Flirt signatures HTC tạo☆20Oct 21, 2024Updated last year
- ☆430Apr 22, 2025Updated last year