frederikme / sandboxedLinks
Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RAM and amount of cpu cores. Easy to use Python 3 library.
☆18Updated 3 years ago
Alternatives and similar repositories for sandboxed
Users that are interested in sandboxed are comparing it to the libraries listed below
Sorting:
- Conquer the deep ocean, host an .onion site fast!☆16Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- The official command line client for IPFinder☆11Updated 6 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Windows productivity tweaks☆15Updated 5 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- CVE-2020-0688☆10Updated 5 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- Expose local port of a remote victim over Internet☆11Updated 5 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 7 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- cool dockerfiles☆13Updated 9 years ago
- module for certexfil☆15Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 7 years ago
- DarkRat source - beware untested source and resources.☆22Updated 5 years ago
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 4 months ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago