kaganisildak / malwarescarecrowLinks
A tool designed to make physical devices detectable by malware and make system look like virtual machine.
☆393Updated 4 years ago
Alternatives and similar repositories for malwarescarecrow
Users that are interested in malwarescarecrow are comparing it to the libraries listed below
Sorting:
- High Octane Triage Analysis☆763Updated this week
- A Binary Genetic Traits Lexer Framework☆499Updated last week
- Dynamic unpacker based on PE-sieve☆746Updated 2 months ago
- This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or …☆288Updated last year
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆305Updated last month
- Malduck is your ducky companion in malware analysis journeys☆338Updated last month
- A GUI and CLI tool for removing bloat from executables☆410Updated last month
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆374Updated 6 months ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆384Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆583Updated last year
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- Code snips and notes☆137Updated 3 years ago
- A golang CLI tool to download malware from a variety of sources.☆148Updated last month
- Assortment of hashing algorithms used in malware☆370Updated 3 weeks ago
- A list of public attacks on BitLocker☆318Updated 5 months ago
- Malware repository component for samples & static configuration with REST API interface.☆363Updated last week
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆613Updated 3 weeks ago
- Comprehensive toolkit for Ghidra headless.☆357Updated 3 months ago
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆458Updated 3 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆434Updated this week
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆165Updated last month
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆425Updated last year
- PCAP visualization tool☆103Updated 2 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Updated 3 years ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆283Updated this week
- Windows x64 handcrafted token stealing kernel-mode shellcode☆509Updated last year
- The xx file format. Turn your hex dumps into art, then into binary data.☆344Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆253Updated 2 years ago
- Bootkit sample for firmware attack☆258Updated 8 months ago
- "Screwed Drivers" centralized information source for code references, links, etc.☆363Updated 5 years ago