| AlicanAkyol/sems |
340 |
|
0 |
0 |
over 7 years ago |
0 |
|
2 |
|
C++ |
| Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools |
| blacktop/docker-cuckoo |
246 |
|
0 |
0 |
about 6 years ago |
0 |
|
13 |
other |
Shell |
| Cuckoo Sandbox Dockerfile |
| d4rksystem/VBoxCloak |
179 |
|
0 |
0 |
about 3 years ago |
0 |
|
0 |
gpl-2.0 |
PowerShell |
| A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to evade analysis. Guaranteed to bring down your pafish ratings by at least a few points ;) |
| P4T12ICK/ypsilon |
116 |
|
0 |
0 |
almost 8 years ago |
0 |
|
0 |
gpl-3.0 |
TeX |
| Automated Use Case Testing |
| qeeqbox/rhino |
74 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
agpl-3.0 |
JavaScript |
| Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors |
| fr0gger/RocProtect-V1 |
73 |
|
0 |
0 |
about 7 years ago |
0 |
|
1 |
|
C++ |
| Emulating Virtual Environment to stay protected against advanced malware |
| malwarenights/rebox |
7 |
|
0 |
0 |
over 6 years ago |
0 |
|
0 |
gpl-2.0 |
Batchfile |
| Prepare sandbox for the reverse engineering of malware |
| void-stack/Hypervisor-Detection |
7 |
|
0 |
0 |
over 3 years ago |
0 |
|
0 |
gpl-3.0 |
C++ |
| Detects virtual machines and malware analysis environments in the same way that malware do |
| agorecki/AnalysisLab |
5 |
|
0 |
0 |
about 6 years ago |
0 |
|
0 |
|
PowerShell |
| Deploy a malware analysis lab using code via Packer & Vagrant |
| dashjuvi/Cuckoo-Sandbox-vbox-win7 |
5 |
|
0 |
0 |
about 7 years ago |
0 |
|
0 |
|
Python |
| Cuckoo config to run automatized malware, virtualbox + win7 |