frederikme / sandboxedLinks
Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RAM and amount of cpu cores. Easy to use Python 3 library.
☆18Updated 3 years ago
Alternatives and similar repositories for sandboxed
Users that are interested in sandboxed are comparing it to the libraries listed below
Sorting:
- Expose local port of a remote victim over Internet☆11Updated 5 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Password spraying toolkit☆7Updated 4 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated 2 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- A simple, lightweight Remote Access Tool written in Python☆17Updated 6 years ago
- module for certexfil☆15Updated 3 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 5 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- Public exploits☆15Updated 7 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 5 months ago
- Data EXfiltration TestER☆21Updated 5 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Password list character frequency analyzer that can output hashcat masks☆17Updated 6 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 7 years ago
- Password reader for Mozilla Firefox and Thunderbird☆23Updated 5 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago