itaymigdal / MalBox
MalBox is a quick and dirty setup to create a malware analysis VM
☆13Updated 8 months ago
Alternatives and similar repositories for MalBox:
Users that are interested in MalBox are comparing it to the libraries listed below
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆29Updated 2 weeks ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 4 months ago
- Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on t…☆14Updated 2 years ago
- ECC Public Key Cryptography☆37Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated last year
- A script to automate keystrokes through a graphical desktop program.☆35Updated 3 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- ☆34Updated last month
- ☆15Updated 10 months ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 7 months ago
- Deobfuscation of XorStringsNet☆14Updated 6 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated last month
- hiding in plain sight: part 2☆44Updated 10 months ago
- ☆30Updated 5 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Updated last year
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Updated 5 months ago
- Small collection of Active Directory pentesting tools.☆31Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated 10 months ago
- Windows API header file parsing tool to generate source code for Windows API hashing☆5Updated 2 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆13Updated 9 months ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated last year
- ☆35Updated last year
- ☆14Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago