kaganisildak / malwarescarecrow
A tool designed to make physical devices detectable by malware and make system look like virtual machine.
☆392Updated 4 years ago
Alternatives and similar repositories for malwarescarecrow:
Users that are interested in malwarescarecrow are comparing it to the libraries listed below
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆950Updated 3 years ago
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆347Updated 3 months ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆381Updated 3 years ago
- Dynamic unpacker based on PE-sieve☆725Updated last month
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆294Updated 2 years ago
- High Octane Triage Analysis☆722Updated this week
- Malduck is your ducky companion in malware analysis journeys☆329Updated this week
- ☆489Updated last year
- A Binary Genetic Traits Lexer Framework☆490Updated 2 months ago
- This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or …☆269Updated 8 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆578Updated 11 months ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆737Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,133Updated last year
- A golang CLI tool to download malware from a variety of sources.☆143Updated last year
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆257Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆574Updated last month
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆455Updated 2 years ago
- Windows x64 handcrafted token stealing kernel-mode shellcode☆507Updated last year
- A tool that shows detailed information about named pipes in Windows☆622Updated 5 months ago
- ☆484Updated 7 years ago
- Living Off The Land Drivers☆1,153Updated 3 weeks ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆164Updated 2 weeks ago
- Binary Golf Examples and Resources☆252Updated 9 months ago
- Different learning materials☆225Updated last month
- ☆571Updated 5 months ago
- "Screwed Drivers" centralized information source for code references, links, etc.☆356Updated 5 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆415Updated 3 weeks ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,125Updated this week
- Malware repository component for samples & static configuration with REST API interface.☆347Updated last month
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆236Updated 2 years ago