Tool for Fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage 🙂 Its main …


Tool for Fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage 🙂 Its main …
LightsOut will generate an obfuscated DLL that will disable AMSI & ETW while trying to evade AV. This is done …
Subparse, is a modular framework developed by Josh Strochein, Aaron Baker, and Odin Bernstein. The framework is designed to parse …
Neton is a tool for getting information from Internet connected sandboxes. It is composed by an agent and a web …
Disclaimer/Liability The work that follows is a POC to enable malware to “key” itself to a particular victim in order …
In preparation for a VBS AV Evasion Stream/Video I was doing some research for Office Macro code execution methods and …
“Norimaci” is a simple and lightweight malware analysis sandbox for macOS. This tool was inspired by “Noriben“. Norimaci uses the …
ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file. This zip file is then …
Golang malware development framework Introduction ColdFire provides various methods useful for malware development in Golang. Most functions are compatible with …
wsb-detect enables you to detect if you are running in Windows Sandbox (“WSB”). The sandbox is used by Windows Defender …