itaymigdal / MalBoxLinks
MalBox is a quick and dirty setup to create a malware analysis VM
☆14Updated last year
Alternatives and similar repositories for MalBox
Users that are interested in MalBox are comparing it to the libraries listed below
Sorting:
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 4 months ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- Advanced dynamic malware analysis tool.☆83Updated last year
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆59Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 3 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Small collection of Active Directory pentesting tools.☆31Updated last year
- Deobfuscation of XorStringsNet☆14Updated 10 months ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- AntiRansomware Linux Kernel Module☆37Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- a small wiper malware programmed in c#☆58Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 9 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- A comprehensive all-in-one Python-based Proof of Concept script to discover and exploit a critical authentication bypass vulnerability (C…☆12Updated 4 months ago
- Poc of using youtube comments for C2 communications☆10Updated 4 years ago
- ECC Public Key Cryptography☆39Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- An offensive security framework for writing payloads☆17Updated 3 years ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆41Updated 2 months ago
- ☆12Updated 5 months ago