Your malware’s favorite sandbox – where red teamers come to bury their payloads.
A sandbox environment designed specifically for malware development and payload testing.
This Web Application enables red teamers to validate evasion techniques, assess detection signatures, and test implant behavior before deployment in the field.
Think of it as your personal LitterBox for perfecting your tradecraft without leaving traces on production detection systems.
The platform provides automated analysis through an intuitive web interface, monitoring process behavior and generating comprehensive runtime analysis reports.
This ensures your payloads work as intended before execution in target environments.
For Windows executables (.exe, .dll, .sys):
For Microsoft Office files (.docx, .xlsx, .doc, .xls, .xlsm, .docm):
Available in two modes:
Features include:
For more information click here.
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new…
This article delves into our comprehensive training program designed to teach you the intricacies of…
BloodHound.py is a Python based ingestor for BloodHound, based on Impacket. The code in this…
In 2025 I wanted to try something new. In addition to a traditional 100 days…
presenterm lets you create presentations in markdown format and run them from your terminal, with…
Jailbreak is an attack that prompts a language model to give actionable responses to harmful…