Run malware. Capture everything. Stay isolated.
SecVF spins up hardware-isolated VMs via Apple's Virtualization framework, routes their traffic through an instrumented Kali Linux router, and gives you Wireshark-grade packet analysis β all in a native macOS app.
|
Detonate samples in isolated VMs with full network visibility. Every packet captured, every connection logged. Hardware-enforced containment via Apple Virtualization Framework β no escape to host. |
L2/L3 software switch with real-time packet capture. Wireshark-style display filters, live protocol breakdown, PCAP export. Kali router VM sits between your malware and the internet. |
|
Ephemeral macOS guest VMs for AI agent execution. APFS CoW session cloning (~0ms), VirtioFS workspace sharing, vsock IPC bridge, DTrace/ESF telemetry β spin up, run, destroy. |
Security audit logging with severity levels (INFO β EMERGENCY). Real-time filesystem monitoring, process telemetry, ISO checksum validation. Full audit trail at |
| VM Library | Packet Analysis |
|---|---|
| Multi-VM management with live packet log panel | Wireshark-style deep packet inspection |
πΈ Screenshots coming soon β build from source and run to see it in action.
| Requirement | Version | Notes |
|---|---|---|
| macOS | 14.0+ Sonoma | Required for Virtualization framework features |
| Xcode | 15.0+ | For building from source |
| Apple Silicon | M1+ | Required for macOS guest VMs; Intel for Linux VMs |
| tshark | optional | Enables packet capture: brew install wireshark |
git clone https://github.com/DaxxSec/SecVF.git
cd SecVF
open SecVF.xcodeproj
# Build & Run: βRbrew install wiresharkβββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β VM Library [+ New VM] β
β βββββββββββββββββββββββββββββββββββββββββββββββββ β
β β Kali-Router Running Virtual Net 192MB β
β β Ubuntu-Sandbox Running Virtual Net 512MB β
β β Windows-11 Stopped NAT - β
β β macOS-14-AI Stopped NAT - β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
- π§ 8 Linux distros β Kali, Ubuntu, Debian, Fedora, Arch & more
- π macOS guest VMs β Full IPSW install via Apple CDN (Apple Silicon only)
- π Multi-window sessions β Each VM gets its own window
- πΎ ISO cache manager β SHA256-verified downloads, no re-downloading
[ Malware VM ] βββ
[ Analysis VM ] ββ€βββΆ [ Virtual Switch ] βββΆ [ Kali Router ] βββΆ Internet
[ AI Sandbox ] βββ (L2/L3) (traffic tap)
β
[ PacketCapture ]
[ tshark/PCAP ]
| Mode | Use Case |
|---|---|
| π NAT | Standard internet access through host |
| π Virtual Network | Isolated VM-to-VM, no host internet |
| π΅οΈ Router VM | Kali as gateway β full traffic interception |
| π FakeNet | DNS/HTTP honeypot β capture malware C2 comms |
Access via Monitoring β Packet Analysis or
ββ§P
| Feature | Details |
|---|---|
| π΄ Live Capture | Start/Stop/Clear with real-time packet stream |
| π Display Filters | Wireshark-style: tcp, ip.addr == 10.0.100.1, dns |
| π Protocol Stats | Live breakdown: TCP/UDP/DNS/ARP/ICMP/HTTP |
| π¬ Packet Decode | Layer-by-layer: Ethernet β IP β TCP/UDP β Application |
| πΎ PCAP Export | Save captures for Wireshark or offline analysis |
| π Hex Dump | Raw bytes with ASCII representation |
| Window | Shortcut | What You See |
|---|---|---|
| π Security Logs | ββ§1 |
Filesystem events, process activity, severity alerts |
| π Network Logs | ββ§2 |
Virtual switch traffic, connection log |
| π¦ Packet Analysis | ββ§P |
Deep packet inspection (tshark) |
| π Switch Statistics | ββ§3 |
Forwarding rates, MAC table, dropped packets |
| β ISO Cache Audit | ββ§4 |
Download history, checksum validation log |
SecVF/
βββ π§ Core
β βββ AppDelegate.swift # App lifecycle, VM window management
β βββ VMManager.swift # VM CRUD, bundle management
β βββ VMConfiguration.swift # Codable VM settings model
β
βββ π Network Stack
β βββ VirtualNetworkSwitch.swift # L2/L3 software switch, MAC learning
β βββ PacketCaptureManager.swift # tshark integration, Combine publishers
β βββ PacketAnalysisWindowController.swift # Wireshark-style UI
β
βββ π₯οΈ UI
β βββ VMLibraryWindowController.swift # Main window (~2600 LOC)
β
βββ π€ AI Sandbox
β βββ AISandboxMacVMConfiguration.swift # macOS guest VM + vsock IPC
β
βββ π Security
β βββ VMSecurityMonitor.swift # Real-time security event logging
β βββ SecVFError.swift # Typed errors, audit trail
β
βββ π¦ Supporting
β βββ ISOCacheManager.swift # ISO download + SHA256 verification
β βββ MacOSVMInstaller.swift # IPSW download from Apple CDN
β βββ ScriptsUSBManager.swift # Guest VM script delivery
β
βββ π Scripts
βββ kali-router-setup.sh # Kali as NAT router + traffic tap
βββ kali-fakenet-setup.sh # FakeNet DNS/HTTP honeypot
βββ provision-macos-vm.sh # AI Sandbox macOS guest provisioning
# 1. Set up your analysis environment
# Create Kali Router VM β run kali-router-setup.sh inside it
# 2. Create your malware sandbox VM
# New VM β Linux/Windows β Virtual Network mode
# 3. Start monitoring
# ββ§P β Start Capture
# 4. Detonate
# Execute malware sample in sandbox VM
# 5. Analyze
# Watch live traffic in packet panel
# Export PCAP for deeper Wireshark analysis
# Check Security Logs (ββ§1) for filesystem activityEphemeral macOS VMs for safe AI agent execution:
Build once: AISandboxMacVMInstaller.downloadAndInstall()
βββΆ IPSW download β macOS install β provision
βββΆ ai-sandbox-base-v1.bundle (~/.avf/AISandbox/)
Each session: AISandboxVMSession.cloneBase() # APFS CoW, ~0ms
AISandboxVMSession.boot()
AISandboxVMSession.run("your command") # vsock:2222
AISandboxVMSession.destroy() # wipe session bundle
Isolation guarantees: hardware VM boundary Β· non-admin agent user Β· workspace-only write access Β· DTrace + ESF telemetry
| Action | Shortcut |
|---|---|
| New VM | βN |
| Start VM | βS |
| Stop VM | β. |
| Packet Analysis | ββ§P |
| Security Logs | ββ§1 |
| Network Logs | ββ§2 |
| Switch Stats | ββ§3 |
| ISO Cache Audit | ββ§4 |
- Apple Virtualization Framework β Hardware-enforced VM isolation (macOS 14+)
- Swift Concurrency β
async/await,@MainActor, Combine for reactive packet updates - tshark β Packet capture via FIFO pipe, JSON output parsing
- VirtioFS β High-performance hostβguest file sharing
- vsock β Low-latency hostβVM IPC (AI Sandbox command channel)
- Hardware isolation β Apple Virtualization Framework, not containers
- No shared folders by default β VMs are air-gapped from host filesystem
- IPSW validation β Downloads only from
*.cdn-apple.com, TLS 1.2+, extension check - ISO verification β SHA256 checksums fetched from official distro mirrors
- URL domain whitelisting β Hardcoded allowlist for all network downloads
- Severity-levelled alerting β INFO / WARNING / CRITICAL / EMERGENCY events
- Audit trail β
~/.avf/logs/security-*.log,error-audit.log
# Fork β branch β commit β PR
git checkout -b feature/your-feature
git commit -m "feat: add your feature"
git push origin feature/your-feature
# Open a Pull Request on GitHubMIT β see LICENSE.txt