 imalse
 imalse 
 Malware simulator
 A framework to simulate and emulate malware behavior in a controlled environment.
Integrated MALware Simulator and Emulator
13 stars
 2 watching
 6 forks
 
Language: Tcl 
last commit: almost 12 years ago 
Linked from   1 awesome list  
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | A collection of educational scripts and payloads for simulating vulnerabilities and malware attacks on Windows systems using custom hardware. | 60 | 
|  | A web application designed to simulate vulnerabilities and demonstrate the importance of proper validation and logging. | 31 | 
|  | A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. | 271 | 
|  | An Android app designed to demonstrate common web application vulnerabilities and provide training in secure coding practices. | 10 | 
|  | A tool to help analyze malware behavior by simulating network interactions and replaying captured responses. | 445 | 
|  | A tool for simulating human-like behaviors in language models using generative agents | 764 | 
|  | A reinforcement learning environment for simulating attack and defense operations in an abstract network intrusion game | 74 | 
|  | A tool that simulates realistic user behavior to support tradecraft development in lab environments | 393 | 
|  | A tool for modeling and simulating complex systems using language rules and visualizing them as networks | 1 | 
|  | A tool for simulating phishing attacks in red teaming exercises. | 1,451 | 
|  | A tool that generates custom-made files to trigger YARA rules and mimic malware behavior. | 242 | 
|  | Emulates specific components of the Windows operating system to analyze malware | 1,538 | 
|  | An interactive Xcode playground demonstrating the effects of CAAnimation and CAMediaTiming on rendering | 1 | 
|  | An experimental HTTP load testing application built using Rust to simulate large volumes of concurrent requests | 110 | 
|  | An open-source reinforcement learning framework to generate adversarial examples for malware classification models. | 41 |