Fake Sandbox Processes small script will simulate fake processes of analysis, sandbox and VM software that some malware will try to avoid. You can download the original script made by @x0rz here (thanks, by the way).
You can also download my slightly optimised script from the root directory. The file is named fsp.ps1. This exact script is also used in the FSP installer.
Script-Features
Also Read – PasteHunter : Scanning Pastebin With Yara Rules
Right-click the file and choose “Run with Powershell”
~ OR ~
Open the command line and paste this command (don’t forget to adjust the path):
Powershell -executionpolicy remotesigned -F ‘Your\Path\fsp.ps1’
After pressing enter you can choose to either start or stop all processes.
If you’re just using the script and start it manually, you will have to re-run it at every re-login or startup to create the processes again. In order to autostart the script I made an easy-to-use installer.
fsp-installer.bat
file from the release section or from the folder installer
.—> You can now close the window or press any key to close it. The installation is complete.
If you no longer want this program on your computer, you’ll need the fsp-installer.bat
file again. Run it and chose “u” to start the removal process. Then enter “y” if you are ready to purge all created files.
If the process was successful, you’ll see a confirmation screen – done.
Successfully tested on the following Windows versions:
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…