kaganisildak / malwarescarecrowLinks
A tool designed to make physical devices detectable by malware and make system look like virtual machine.
☆394Updated 5 years ago
Alternatives and similar repositories for malwarescarecrow
Users that are interested in malwarescarecrow are comparing it to the libraries listed below
Sorting:
- A Binary Genetic Traits Lexer Framework☆515Updated 2 months ago
 - Dynamic unpacker based on PE-sieve☆775Updated last month
 - High Octane Triage Analysis☆778Updated this week
 - Malduck is your ducky companion in malware analysis journeys☆346Updated 4 months ago
 - Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆584Updated last year
 - A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆406Updated 9 months ago
 - A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆353Updated 3 months ago
 - This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or …☆288Updated last year
 - Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆387Updated 4 years ago
 - PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆427Updated 5 years ago
 - Code snips and notes☆137Updated 3 years ago
 - A wireshark plugin to instrument ETW☆574Updated 3 years ago
 - Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆748Updated 3 years ago
 - ☆511Updated last year
 - A golang CLI tool to download malware from a variety of sources.☆150Updated 4 months ago
 - Binary Golf Examples and Resources☆259Updated last week
 - InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date…☆573Updated 3 years ago
 - Distributed malware processing framework based on Python, Redis and S3.☆444Updated 3 weeks ago
 - "Screwed Drivers" centralized information source for code references, links, etc.☆369Updated 5 years ago
 - Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆434Updated last year
 - Bootkit sample for firmware attack☆260Updated 11 months ago
 - A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆951Updated 4 years ago
 - Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Updated 3 years ago
 - Windows x64 handcrafted token stealing kernel-mode shellcode☆509Updated last year
 - Assortment of hashing algorithms used in malware☆382Updated this week
 - The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆168Updated 3 weeks ago
 - Comprehensive toolkit for Ghidra headless.☆361Updated 6 months ago
 - MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆798Updated 3 years ago
 - Venom is a library that meant to perform evasive communication using stolen browser socket☆392Updated 2 years ago
 - PCAP visualization tool☆104Updated 2 years ago