frederikme / sandboxed
Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RAM and amount of cpu cores. Easy to use Python 3 library.
☆18Updated 3 years ago
Alternatives and similar repositories for sandboxed:
Users that are interested in sandboxed are comparing it to the libraries listed below
- ☆24Updated 3 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 8 months ago
- module for certexfil☆15Updated 2 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 4 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated last year
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- CVE-2020-0601 #curveball - Alternative Key Calculator☆77Updated 5 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- The pattern matching swiss knife☆15Updated 5 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 6 years ago
- Carbanak source code leak.☆9Updated 6 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆35Updated 6 years ago
- Reuploading the code she removed.☆14Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Emulate the handshake packets of an RDP server with python☆15Updated 6 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Expose local port of a remote victim over Internet☆11Updated 5 years ago
- Light C++ Logger Library☆18Updated 7 years ago
- Password spraying toolkit☆7Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Polite, slim and concurrent web crawler.☆13Updated 4 years ago