itaymigdal / MalBoxLinks
MalBox is a quick and dirty setup to create a malware analysis VM
☆14Updated last year
Alternatives and similar repositories for MalBox
Users that are interested in MalBox are comparing it to the libraries listed below
Sorting:
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Advanced dynamic malware analysis tool.☆82Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆58Updated 3 months ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- Deobfuscation of XorStringsNet☆14Updated last year
- a small wiper malware programmed in c#☆59Updated 3 years ago
- A Repository to Track Anti-Forensic Techniques☆118Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- ☆31Updated 2 years ago
- ☆32Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- Some of my Malware Analysis writeups☆48Updated 3 months ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Updated 9 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 3 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 7 months ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆16Updated last year
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated 2 years ago
- Simulate Windows EXE for Malware Research!☆18Updated last year