malwarescarecrow
Malware decoy
A tool designed to make physical devices detectable by malware and create a deceptive environment for evasion techniques.
A tool designed to make physical devices detectable by malware and make system look like virtual machine.
382 stars
12 watching
23 forks
Language: Python
last commit: over 4 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 377 |
| Emulates specific components of the Windows operating system to analyze malware | 1,538 |
| A tool for decompressing malware samples and running Yara rules against them. | 7 |
| A framework for building flexible and lightweight malware analysis pipelines | 395 |
| A platform for analyzing malware and performing reverse engineering on binary files | 424 |
| An analysis tool that reveals anti-debugging and anti-VM techniques used by malware samples. | 735 |
| A tool for automatically analyzing malware behavior and identifying patterns and classes. | 369 |
| A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment. | 2,043 |
| Provides a set of standardized indicators to help detect and assess malware presence | 10 |
| A curated dataset and feature extraction method for malware detection using image-based machine learning classification. | 42 |
| Creates artificial artifacts to evade malware detection and analysis | 252 |
| A Python framework that provides an API interface to multiple online services for analyzing malware and threat intelligence | 368 |
| A tool suite for creating and loading malware payloads on various platforms | 820 |
| A collection of educational scripts and payloads for simulating vulnerabilities and malware attacks on Windows systems using custom hardware. | 60 |
| An assistant tool designed to create malicious MS Office documents by hiding or tampering with VBA macros and macro analysis tools | 2,131 |