A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analysis.
☆426Jan 25, 2025Updated last year
Alternatives and similar repositories for VMwareCloak
Users that are interested in VMwareCloak are comparing it to the libraries listed below
Sorting:
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆399Jul 4, 2025Updated 8 months ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- An automatic unpacker and logger for DotNet Framework targeting files☆264Aug 23, 2023Updated 2 years ago
- TartarusGate, Bypassing EDRs☆653Jan 25, 2022Updated 4 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆218Updated this week
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- Malware Configuration And Payload Extraction☆3,055Updated this week
- ☆138Apr 20, 2023Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 3 months ago
- Using fibers to run in-memory code.☆243Oct 19, 2023Updated 2 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆697Oct 22, 2025Updated 4 months ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆226May 3, 2023Updated 2 years ago
- Windows kernel and user mode emulation.☆1,868Mar 2, 2026Updated last week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,876Aug 18, 2023Updated 2 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,402Nov 7, 2024Updated last year
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,862Updated this week
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆119Apr 8, 2023Updated 2 years ago
- Analyse your malware to surgically obfuscate it☆520Dec 17, 2025Updated 2 months ago
- Vmware Hardened VM detection mitigation loader (anti anti-vm)☆2,197Dec 2, 2022Updated 3 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆324May 1, 2025Updated 10 months ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,100Jun 10, 2024Updated last year
- Sysmon configuration file template with default high-quality event tracing☆576Jan 21, 2026Updated last month
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,564Oct 31, 2025Updated 4 months ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,396Dec 23, 2025Updated 2 months ago
- A tool to kill antimalware protected processes☆1,507Jun 19, 2021Updated 4 years ago
- Practical Windows Forensics Training☆749Feb 16, 2026Updated 3 weeks ago
- Performing Indirect Clean Syscalls☆604Apr 19, 2023Updated 2 years ago
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 10 months ago
- A utility to fix intentionally corrupted UPX packed files.☆93May 22, 2023Updated 2 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,614Jan 13, 2024Updated 2 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆784Jun 23, 2023Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago