frederikme / sandboxed
Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RAM and amount of cpu cores. Easy to use Python 3 library.
☆18Updated 3 years ago
Alternatives and similar repositories for sandboxed
Users that are interested in sandboxed are comparing it to the libraries listed below
Sorting:
- A Passive DNS backend and collector☆31Updated 2 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 3 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Simplified NAT Slipstream server and client☆21Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Python wrappers for mal_unpack☆36Updated last year
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- The pattern matching swiss knife☆15Updated 5 years ago
- Host IDS for desktop users☆11Updated 4 years ago
- A simple, lightweight Remote Access Tool written in Python☆17Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Light C++ Logger Library☆19Updated 7 years ago
- Expose local port of a remote victim over Internet☆11Updated 5 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆11Updated 5 years ago
- recover Firefox and more browsers logins☆49Updated 3 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- ☆35Updated 6 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Yara rules for various malware☆9Updated 2 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated last year
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago