frederikme / sandboxed
Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RAM and amount of cpu cores. Easy to use Python 3 library.
☆17Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for sandboxed
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- The pattern matching swiss knife☆14Updated 5 years ago
- A collection of personal ZAP scripts☆13Updated last year
- A Passive DNS backend and collector☆31Updated 2 years ago
- Polite, slim and concurrent web crawler.☆13Updated 3 years ago
- Standardizing Security Titles☆13Updated last year
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆16Updated 5 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Automatic generator of YARA modules based in protocol buffers☆14Updated 2 months ago
- Automated Static Analysis Framework☆10Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 3 months ago
- Python wrappers for mal_unpack☆34Updated last year
- Simplified NAT Slipstream server and client☆20Updated 3 years ago
- A simple, lightweight Remote Access Tool written in Python☆15Updated 5 years ago
- Data exfiltration using DNS☆21Updated 4 years ago
- Files related to my training classes☆15Updated 3 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Light C++ Logger Library☆18Updated 6 years ago
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- edge --> powerpoint --> remote-file --> shell☆13Updated 5 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- Download a Bunch of Malware for Demos and Testing☆13Updated 6 years ago