frederikme / sandboxed
Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RAM and amount of cpu cores. Easy to use Python 3 library.
☆18Updated 3 years ago
Alternatives and similar repositories for sandboxed:
Users that are interested in sandboxed are comparing it to the libraries listed below
- Expose local port of a remote victim over Internet☆11Updated 5 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Conquer the deep ocean, host an .onion site fast!☆15Updated 2 years ago
- Polite, slim and concurrent web crawler.☆13Updated 4 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- Python wrappers for mal_unpack☆35Updated last year
- ☆35Updated 6 years ago
- ☆16Updated 2 years ago
- A simple AES malware crypter☆16Updated 6 years ago
- The pattern matching swiss knife☆15Updated 5 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 3 weeks ago
- Windows Process Injection Toolkit - plain and simple :)☆26Updated 6 years ago
- Repo to store Windows PE's and Utilities for easy access.☆16Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆12Updated 3 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆20Updated 3 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 3 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated last year
- ☆12Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 3 years ago
- Bustr is a utility built to discover if any new Usb, Storage, Phone or Bluetooth device has been attached/paired with system☆10Updated 4 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago