frederikme / sandboxedLinks
Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RAM and amount of cpu cores. Easy to use Python 3 library.
☆18Updated 4 years ago
Alternatives and similar repositories for sandboxed
Users that are interested in sandboxed are comparing it to the libraries listed below
Sorting:
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- A simple AES malware crypter☆16Updated 7 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 6 years ago
- recover Firefox and more browsers logins☆48Updated 4 years ago
- Help deobfuscate VBScript☆17Updated 3 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 6 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Updated last year
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated last year
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Updated 5 years ago
- ☆14Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 5 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- ☆17Updated 7 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 7 years ago
- Experimenting with destructive file attacks in Go☆19Updated 6 years ago
- PoC code from blog☆16Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- edge --> powerpoint --> remote-file --> shell☆11Updated 6 years ago
- Another Portable Executable files analysing stuff☆21Updated 14 years ago
- ☆15Updated 4 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 4 months ago