frederikme / sandboxedLinks
Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RAM and amount of cpu cores. Easy to use Python 3 library.
☆18Updated 3 years ago
Alternatives and similar repositories for sandboxed
Users that are interested in sandboxed are comparing it to the libraries listed below
Sorting:
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 4 months ago
- Simplified NAT Slipstream server and client☆21Updated 4 years ago
- The pattern matching swiss knife☆15Updated 5 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- ☆16Updated 2 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆21Updated 3 years ago
- Monitor malware scanning services for your payloads☆11Updated 3 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- ☆19Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- A simple, lightweight Remote Access Tool written in Python☆17Updated 6 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- ☆17Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago