-
Notifications
You must be signed in to change notification settings - Fork 96
Packages
vm-packages edited this page Dec 18, 2025
·
44 revisions
This page documents the available VM packages sorted by category. The packages in the FLARE-VM default configuration are marked in bold. Note that packages installed as dependencies may not be marked in bold and still installed as part of the default configuration.
Note: This page is generated automatically. Do not edit it manually.
| Package | Description |
|---|---|
| c3.vm | C3 (Custom Command and Control) enables rapid prototyping of custom C2 channels, integrating with existing offensive toolkits. Link |
| covenant.vm | Covenant is a collaborative .NET C2 framework for red teamers. Link |
| merlin.vm | Merlin is a cross-platform post-exploitation Command and Control server and agent written in Go. |
| metasploit.vm | Metasploit is a penetration testing framework for finding vulnerabilities, penetration testing, and developing IDS signatures. Link |
| sliver.vm | Sliver is an open source cross-platform adversary emulation/red team framework. |
| wmimplant.vm | WMImplant is a PowerShell tool using WMI for remote actions and as a C2 channel. Link |
| Package | Description |
|---|---|
| adconnectdump.vm | This toolkit offers several ways to extract and decrypt stored Azure AD and Active Directory credentials from Azure AD Connect servers. |
| asreproast.vm | Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled. |
| credninja.vm | This tool will tell you if the credentials you dumped are valid on the domain, and if you have local administrator access to a host. |
| dumpert.vm | Dumpert is a LSASS memory dumper using direct system calls and API unhooking. Link |
| getlapspasswords.vm | PowerShell function to pull the local admin passwords from LDAP, stored there by LAPS. |
| hashcat.vm | Hashcat is a fast password recovery utility. |
| internal-monologue.vm | Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS |
| inveigh.vm | Inveigh is a cross-platform .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers. |
| keethief.vm | Allows for the extraction of KeePass 2.X key material from memory, as well as the backdooring and enumeration of the KeePass trigger system. |
| kerbrute.vm | A tool to quickly bruteforce and enumerate valid Active Directory accounts through Kerberos Pre-Authentication |
| mailsniper.vm | MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms and performing password spraying. |
| mimikatz.vm | Mimikatz is an open-source application that allows users to view and save authentication credentials such as Kerberos tickets |
| nanodump.vm | A Beacon Object File that creates a minidump of the LSASS process. |
| rubeus.vm | Rubeus is a C# toolset for raw Kerberos interaction and abuses. |
| safetykatz.vm | SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader. |
| sharpcliphistory.vm | SharpClipHistory is a .NET 4.5 application written in C# that can be used to read the contents of a user's clipboard history in Windows 10 starting from the 1809 Build. |
| sharpdump.vm | SharpDump is a C# port of PowerSploit's Out-Minidump.ps1 functionality. |
| sharplaps.vm | This executable is made to be executed within Cobalt Strike session using execute-assembly. It will retrieve the LAPS password from the Active Directory. |
| sharpsecdump.vm | .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py |
| Package | Description |
|---|---|
| capesolo.vm | Capesolo is an standalone sandbox tool with unpacker and debugger. Link |
| ollydbg.plugin.ollydumpex.vm | Ollydumpex plugin is process memory dumper for OllyDbg and Immunity Debugger. Link |
| ollydbg.plugin.scyllahide.vm | ScyllaHide is an advanced open-source x64/x86 user mode Anti-Anti-Debug library. Link |
| ollydbg.vm | OllyDbg is a 32-bit assembler level analysing debugger for Windows. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. Link |
| ollydbg2.plugin.ollydumpex.vm | Ollydumpex plugin is process memory dumper for OllyDbg2 and Immunity Debugger. Link |
| ollydbg2.plugin.scyllahide.vm | ScyllaHide is an advanced open-source x64/x86 user mode Anti-Anti-Debug library. Link |
| ollydbg2.vm | OllyDbg2 is a 32-bit assembler level analysing debugger for Windows. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. Link |
| ttd.vm | TTD is a time travel debugging command line utility. Link |
| windbg.vm | WinDbg is a debugger that can be used to analyze crash dumps, debug live user-mode and kernel-mode code, and examine CPU registers and memory. Link |
| x64dbg.plugin.dbgchild.vm | DbgChild is an x64dbg plugin to automatically attach to spawned child processes. Link |
| x64dbg.plugin.ollydumpex.vm | Ollydumpex is process memory dumper for OllyDbg and Immunity Debugger. Link |
| x64dbg.plugin.scyllahide.vm | ScyllaHide is an advanced open-source x64/x86 user mode Anti-Anti-Debug library. Link |
| x64dbg.plugin.x64dbgpy.vm | X64dbgpy is a a plugin to access the API of x64dbg using Python. Link |
| x64dbg.vm | x64dbg is a user mode debugger optimized for reverse engineering and malware analysis. Link |
| Package | Description |
|---|---|
| idr.vm | IDR (Interactive Delphi Reconstructor) is a decompiler for Delphi-written Windows32 EXEs and DLLs. Link |
| Package | Description |
|---|---|
| binaryninja.vm | Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform. Link |
| cutter.vm | Cutter is a FOSS dissassembler/decompiler. Link |
| ghidra.vm | Ghidra is a software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission. Link |
| idafree.vm | IDA Free is the free version of IDA Pro, a powerful Interactive DisAssembler and debugger. Link |
| idapro.vm | IDA Pro 9 is an interactive DisAssembler and debugger. Requires ida-pro_9*.exe (optional .hexlic) from https://hex-rays.com/ida-pro in the Desktop. Link
|
| Package | Description |
|---|---|
| didier-stevens-beta.vm | DidierStevensSuiteBeta is a collection of beta malware analysis tools by Didier Stevens. Link |
| didier-stevens-suite.vm | DidierStevensSuite is a collection of malware analysis tools by Didier Stevens. Link |
| ezviewer.vm | Ezviewer is a standalone, zero dependency document viewer and hex editor. Link |
| microsoft-office.vm | Microsoft Office ProPlus2024Retail. |
| offvis.vm | OffVis is an office visualization tool for understanding and deconstructing targeted attacks in .doc, .xls, and .ppt files. Link |
| onenoteanalyzer.vm | OneNoteAnalyzer is a C# based tool for analyzing malicious OneNote documents. Link |
| pdfstreamdumper.vm | PDFStreamDumper is a free, open source tool to analyze malicious PDF documents. Link |
| Package | Description |
|---|---|
| certify.vm | Certify is a C# tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS). |
| microburst.vm | MicroBurst includes functions and scripts that support Azure Services discovery, weak configuration auditing, and post exploitation actions such as credential dumping. |
| petitpotam.vm | PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions |
| powermad.vm | Powermad includes a set of functions for exploiting ms-DS-MachineAccountQuota without attaching an actual system to AD |
| powersploit.vm | PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment. |
| powerupsql.vm | PowerUpSQL helps with SQL Server discovery, weak config audits, privilege escalation, and post-exploitation OS command execution. Link |
| powerzure.vm | PowerZure is a PowerShell project created to assess and exploit resources within Microsoft’s cloud platform, Azure. |
| sharpdpapi.vm | SharpDPAPI is a C# port of some DPAPI functionality from @gentilkiwi's Mimikatz project. |
| sharpup.vm | SharpUp is a C# port of various PowerUp functionality for auditing potential privilege escalation paths. |
| spoolsample.vm | PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. |
| sqlrecon.vm | MSSQL toolkit for reconnaissance and post-exploitation |
| teamfiltration.vm | TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts. |
| whisker.vm | Whisker is a C# tool for Active Directory account takeover via shadow credential injection through msDS-KeyCredentialLink manipulation. Link |
| Package | Description |
|---|---|
| bindiff.vm | BinDiff is a comparison tool for binary files that finds differences and similarities in disassembled code. Link |
| die.vm | DIE (Detect It Easy) is a tool for file type identification with signature-based and heuristic analysis. Link |
| exeinfope.vm | Exeinfo PE displays metadata for a variety of file types and identifies many executable packers. Link |
| exiftool.vm | ExifTool is a tool for reading, writing and manipulating metadata. Link |
| file.vm | file is a Windows port of the Linux file utility for checking header magics. Link
|
| floss.vm | FLOSS automatically deobfuscates strings in malware using advanced static analysis, enhancing basic static analysis like strings.exe. Link |
| hasher.vm | Hasher is a tool to calculate hashes. Link |
| hashmyfiles.vm | HashMyFiles calculates and exports various file hashes (MD5, SHA256, etc.) to clipboard and multiple file formats. Link |
| magika.vm | Magika is an AI powered file type detection tool that uses deep learning to provide accurate detection. Link |
| Package | Description |
|---|---|
| aleapp.vm | Android Logs Events And Protobuf Parser. |
| amcacheparser.vm | Amcache.hve parser with lots of extra features. Handles locked files |
| appcompatcacheparser.vm | AppCompatCache aka ShimCache parser. Handles locked files |
| arsenalimagemounter.vm | Mounts the contents of disk images as complete disks in Windows. |
| autopsy.vm | Autopsy is a graphical interface to The Sleuth Kit and other open source digital forensics tools. |
| chainsaw.vm | Chainsaw provides a powerful 'first-response' capability to quickly identify threats within Windows forensic artefacts such as Event Logs and the MFT file. |
| dcode.vm | Utility for converting data found on desktop and mobile devices into human-readable timestamps. |
| event-log-explorer.vm | Software solution for viewing, analyzing and monitoring events recorded in Microsoft Windows event logs. |
| evtxecmd.vm | Event log (evtx) parser with standardized CSV, XML, and json output! Custom maps, locked file support, and more! |
| ftk-imager.vm | FTK Imager is a data preview and imaging tool used to acquire electronic evidence in a forensically sound manner. Link |
| hayabusa.vm | Windows event log fast forensics timeline generator and threat hunting tool |
| jlecmd.vm | Jump List parser |
| jumplist_explorer.vm | GUI based Jump List viewer |
| kernel-ost-viewer.vm | Facilitates efficient OST file recovery with features such as advanced message search, snapshot management and diverse file format saving. |
| kernel-outlook-pst-viewer.vm | Standalone platform for opening PST files without installing MS Outlook. |
| lecmd.vm | Parse lnk files |
| logfileparser.vm | Decode and dump lots of transaction information from the $LogFile on NTFS. |
| memprocfs.vm | MemProcFS is an easy and convenient way of viewing physical memory as files in a virtual file system. |
| mft_explorer.vm | Graphical $MFT viewer |
| mftecmd.vm | $MFT, $Boot, $J, $SDS, $I30, and $LogFile (coming soon) parser. Handles locked files |
| pecmd.vm | Prefetch parser |
| rbcmd.vm | Recycle Bin artifact (INFO2/$I) parser |
| recentfilecacheparser.vm | RecentFileCache parser |
| recmd.vm | Powerful command line Registry tool searching, multi-hive support, plugins, and more |
| rla.vm | Replay transaction logs and update Registry hives so they are no longer dirty. Useful when tools do not know how to handle transaction logs |
| sbecmd.vm | ShellBags Explorer, command line edition, for exporting shellbag data |
| sdb_explorer.vm | Shim database GUI |
| shellbags_explorer.vm | GUI for browsing shellbags data. Handles locked files |
| sqlecmd.vm | Find and process SQLite files according to your needs with maps! |
| srumecmd.vm | Process SRUDB.dat and (optionally) SOFTWARE hive for network, process, and energy info! |
| sumecmd.vm | Process Microsoft User Access Logs found under "C:\Windows\System32\LogFiles\SUM" |
| testdisk.vm | A robust data recovery tool, TestDisk, specializes in restoring lost partitions across diverse filesystems and facilitates file undeletion within supported filesystems. |
| timeline_explorer.vm | View CSV and Excel files, filter, group, sort, etc. with ease |
| vscmount.vm | Mount all VSCs on a drive letter to a given mount point |
| wxtcmd.vm | Windows 10 Timeline database parser |
| Package | Description |
|---|---|
| goresym.vm | GoReSym is a Go symbol recovery tool. Link |
| gostringungarbler.vm | GoStringUngarbler deobfuscates strings in Go binaries obfuscated by garble. Link |
| Package | Description |
|---|---|
| 010editor.vm | 010 Editor is a text and hex editor with Binary Templates technology. Link |
| hxd.vm | HxD is a fast hex editor for inspecting and editing large files, raw disks, and RAM. Link |
| imhex.vm | ImHex is a hex editor with a custom pattern language, data inspector, disassembler, and file diffing capabilities Link |
| Package | Description |
|---|---|
| ida.plugin.capa.vm | capa explorer is an IDAPython plugin that integrates capa with IDA Pro. Link |
| ida.plugin.comida.vm | ComIDA is an IDAPython Plugin that help analyzing modules using COM. Link |
| ida.plugin.dereferencing.vm | deREferencing is an IDAPython plugin that enhances registers and stack views by adding dereferenced pointers, colors, and other useful information. Link |
| ida.plugin.diaphora.vm | Diaphora is an IDAPython plugin that performs advanced program diffing by comparing assembler, pseudo-code, functions, and data structures. Link |
| ida.plugin.flare-emu.vm | A user friendly scriptable emulation framework that supports multiple binary analysis tools. Link |
| ida.plugin.flare.vm | FLARE IDAPython plugins include Shellcode Hashes to find API calls from hashes and ApplyCalleeType to apply function prototypes to indirect calls. Link |
| ida.plugin.hashdb.vm | HashDB is an IDAPython plugin that connects to an online community library to look up hashes, identifying API names and strings in malware. Link |
| ida.plugin.hrtng.vm | hrtng is an IDA Pro plugin with features such as decryption, automation, deobfuscation, patching, lib code recognition and pseudocode transformations. Link |
| ida.plugin.ifl.vm | IFL (Interactive Functions List) is an IDAPython plugin for navigating function references and importing reports from tools like PE-sieve. Link |
| ida.plugin.lighthouse.vm | Lighthouse is an IDAPython plugin that explores code coverage, providing interactive controls to study execution maps. Link |
| ida.plugin.sigmaker.vm | Signature Maker is an IDA 9+ Pro plugin that generates signatures. Link |
| ida.plugin.xray.vm | xray is an IDAPython plugin that filters and colorizes Hexrays decompiler output based on regular expressions to highlight interesting code patterns. Link |
| ida.plugin.xrefer.vm | XRefer is an IDAPython plugin that provides a custom navigation interface with path graphs and Gemini-powered descriptions to speed up analysis. Link |
| Package | Description |
|---|---|
| ifpstools.vm | IFPSTools.NET creates, modifies, assembles, and disassembles RemObjects compiled bytecode files. Link |
| innoextract.vm | innoextract unpacks Inno Setup installers and variants. Link |
| innounp.vm | innounp unpacks Inno Setup installers. Link |
| isd.vm | Inno Setup Decompiler provides a useful UI to analyze Inno Setup compiled code scripts. |
| Package | Description |
|---|---|
| apktool.vm | A tool for reverse engineering 3rd party, closed, binary Android apps. |
| bytecodeviewer.vm | A lightweight user-friendly Java/Android Bytecode Viewer, Decompiler and more. |
| dex2jar.vm | Tools to work with android .dex and java .class files. |
| openjdk.vm | Metapackage for OpenJDK to ensure all packages use the same OpenJDK version. |
| recaf.vm | java bytecode editor |
| Package | Description |
|---|---|
| js-beautify.vm | JavaScript beautifier and deobfuscator. |
| js-deobfuscator.vm | Deobfuscator to remove common JS obfuscation techniques. |
| malware-jail.vm | Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. |
| nodejs.vm | Metapackage for Node.js to ensure all packages use the same Node.js version. |
| obfuscator-io-deobfuscator.vm | A deobfuscator for scripts obfuscated by Obfuscator.io |
| Package | Description |
|---|---|
| invoke-thehash.vm | Invoke-TheHash contains PowerShell functions for performing pass the hash WMI and SMB tasks. |
| sharpexec.vm | SharpExec is an offensive security C# tool designed to aid with lateral movement. |
| Package | Description |
|---|---|
| hollowshunter.vm | Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches). |
| pesieve.vm | pe-sieve recognizes and dumps variety of implants within the scanned process. |
| processdump.vm | Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. |
| Package | Description |
|---|---|
| fakenet-ng.vm | FakeNet-NG is a dynamic network analysis tool. |
| fiddler.vm | Intercepts, decrypts, and analyzes HTTPS traffic |
| internet_detector.vm | Tool that changes the background and a taskbar icon if it detects internet connectivity |
| networkminer.vm | NetworkMiner is a network forensics tool for extracting artifacts (files, images, emails, passwords) from PCAP files and live traffic. Link |
| nmap.vm | Port scanning utility and nc replacement with extended features |
| npcap.vm | Npcap is an architecture for packet capture and network analysis for Windows operating systems, consisting of a software library and a network driver. |
| openvpn.vm | OpenVPN is a full-featured open source SSL VPN solution that accommodates a wide range of configurations. |
| powercat.vm | PowerShell implementation of netcat functionality |
| putty.vm | PuTTY is a free implementation of SSH and Telnet for Windows and Unix platforms, along with an xterm terminal emulator. |
| streamdivert.vm | StreamDivert is a tool to man-in-the-middle or relay in and outgoing network connections on a system. Link |
| telnet.vm | A network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines |
| windump.vm | Windows version of tcpdump, the command line network analyzer for UNIX |
| wireshark.vm | Wireshark lets you capture and interactively browse the traffic running on a computer network. |
| Package | Description |
|---|---|
| dependencywalker.vm | Scans PE files and builds a hierarchical tree diagram of all dependent modules |
| dll-to-exe.vm | Converts a DLL into a ready-to-use EXE |
| explorersuite.vm | A suite of tools including CFF Explorer and a process viewer. |
| pdbs.pdbresym.vm | PDBs downloaded using PDBReSym. Requires substantial disk space. |
| pe_unmapper.vm | Small tool to convert beteween the PE alignments (raw and virtual) |
| peanatomist.vm | PE Analysis tool providing detailed information |
| pebear.vm | Delivers fast and flexible "first view" for malware analysts |
| peid.vm | PEiD detects most common packers, cryptors and compilers for PE files. |
| pestudio.vm | The goal of pestudio is to spot artifacts of executable files in order to ease and accelerate Malware Initial Assessment. |
| setdllcharacteristics.vm | A CLI tool for manipulating ASLR, DEP, and check signature flags of PE files |
| Package | Description |
|---|---|
| advanced-installer.vm | Advanced Installer is a Windows installer authoring tool that can be used to analyze MSI files. |
| asar.vm | asar decompresses .asar archives |
| autoit-ripper.vm | Extracts compiled AutoIt scripts from PE executables. |
| pkg-unpacker.vm | Unpacker for pkg applications. |
| uniextract2.vm | Universal Extractor 2 is an unofficial updated and extended version of the original UniExtract by Jared Breland. |
| upx.vm | UPX is a free, secure, portable, extendable, high-performance executable packer for several executable formats. |
| Package | Description |
|---|---|
| badassmacros.vm | Proof of Concept tool to generate malicious macros leveraging techniques like VBA Purging and Shellcode Obfuscation to evade AV engines. |
| confuserex.vm | ConfuserEx is a open-source protector for .NET applications. It is the successor of Confuser project. |
| dotnettojscript.vm | A tool to generate a JScript which bootstraps an arbitrary .NET Assembly and class. |
| evilclippy.vm | A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. |
| gadgettojscript.vm | A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA scripts. |
| invokedosfuscation.vm | Invoke-DOSfuscation is a PowerShell v2.0+ compatible cmd.exe command obfuscation framework. |
| invokeobfuscation.vm | Invoke-Obfuscation is a PowerShell v2.0+ compatible PowerShell command and script obfuscator. |
| stracciatella.vm | Powershell runspace from within C# (aka SharpPick technique) with AMSI, ETW and Script Block Logging disabled. |
| syswhispers2.vm | SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. |
| syswhispers3.vm | SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. |
| unhook-bof.vm | This is a Beacon Object File to refresh DLLs and remove their hooks. The code is from Cylance's Universal Unhooking research. |
| Package | Description |
|---|---|
| juicypotato.vm | Juicy Potato is a local privilege escalation tool for Windows, allowing elevation from a service account to NT AUTHORITY\SYSTEM by abusing COM servers. Link |
| Package | Description |
|---|---|
| 7zip.vm | 7-zip with NSIS script decompiling that adds an unzip infected option to the right click menu. Link
|
| chrome.extensions.vm | Chrome extensions for popular crypto wallets and password managers to aid in the analysis of credential stealers. |
| cmder.vm | cmder is a console emulator. Link |
| cygwin.vm | cygwin (Unix-like environment and command-line interface) and useful cygwin packages. Link |
| dokan.vm | Dokan simplifies Windows custom file system creation, similar to Linux's FUSE, without requiring device drivers. Link |
| googlechrome.vm | Google Chrome is a web browser with powerful DevTools. Link |
| ipython.vm | IPython is an interactive Python shell. Link |
| nasm.vm | NASM (Netwide Assembler) is an assembler that supports multiple output formats. Link |
| notepadplusplus.vm | Notepad++ is a powerful source code editor. Link |
| notepadpp.plugin.compare.vm | ComparePlus is a Notepad++ plugin to compare files. Link |
| notepadpp.plugin.jstool.vm | JSTool is a Notepad++ plugin to format JavaScript and JSON. Link |
| notepadpp.plugin.xmltools.vm | XMLTools is a Notepad++ plugin for editing XML. Link |
| tor-browser.vm | The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. |
| vcbuildtools.vm | Metapackage that requires the dependencies visualstudio2017buildtools and visualstudio2017-workload-vctools |
| vcredist140.vm | Metapackage for Python 3 to ensure all packages use the same Python version. |
| visualstudio.vm | Visual Studio is an IDE, installed with useful components and workloads. Takes long to install and requires substantial disk space. |
| vscode.extension.jupyter.vm | Jupyter notebook support, interactive programming and computing that supports Intellisense, debugging and more. |
| vscode.extension.python.vm | Python language support with extension access points for IntelliSense (Pylance), Debugging (Python Debugger), linting, formatting, refactoring, unit tests, and more. |
| vscode.vm | VSCode is a modern, open-source code editor. |
| windows-terminal.vm | Windows Terminal is a new, modern, feature-rich, productive terminal application for command-line users. |
| Package | Description |
|---|---|
| libraries.python3.vm | Python 3 libraries useful for common reverse engineering tasks. |
| poetry.vm | Python packaging and dependency management made easy |
| pycdas.vm | pycdas is a Python byte-code disassembler. Link |
| pycdc.vm | pycdc is a Python decompiler. Link |
| python3.vm | Python 3. |
| uncompyle6.vm | uncompyle6 is a decompiler for Python 1.0-3.8. Link |
| unpyc3.vm | unpyc3 is a decompiler for Python 3.7+. Link |
| Package | Description |
|---|---|
| azurehound.vm | AzureHound is the BloodHound data collector for Microsoft Azure. |
| bloodhound-custom-queries.vm | Custom Query list for the Bloodhound GUI based off my cheatsheet |
| bloodhound.vm | BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. |
| egress-assess.vm | Egress-Assess is a tool used to test egress data detection capabilities. |
| gobuster.vm | Directory/file and DNS busting tool written in Go |
| gowitness.vm | gowitness uses Chrome Headless for website screenshots and provides a built-in report viewer. Link |
| group3r.vm | Group3r is a tool for pentesters and red teamers to rapidly enumerate relevant settings in AD Group Policy, and to identify exploitable misconfigurations. |
| ldapnomnom.vm | Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP) |
| mfasweep.vm | MFASweep is a PowerShell script that attempts to log in to various Microsoft services using a provided set of credentials and will attempt to identify if MFA is enabled. |
| netgpppassword.vm | .NET/C# implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences. |
| outflank-c2-tool-collection.vm | Contains a collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques. |
| routesixtysink.vm | Route Sixty-Sink identifies .NET assembly vulnerabilities using automated source-to-sink analysis. Link |
| seatbelt.vm | Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives. |
| sharphound.vm | SharpHound is an Active Directory ingester tool for BloodHound. |
| sharpview.vm | .NET port of PowerView used for information gathering within Active Directory |
| sharpwmi.vm | SharpWMI is a C# implementation of various WMI functionality. |
| situational-awareness-bof.vm | Situational Awareness BOF offers basic host checks in a Beacon Object File, enabling pre-execution reconnaissance before more invasive commands. Link |
| snaffler.vm | Snaffler is a tool for enumerating accessible SMB shares in an Active Directory environment. |
| trustedsec-remote-ops-bof.vm | Addition to Situational Awareness BOFs intended for single task Windows primitives such as creating a task, stopping a service, etc. |
| Package | Description |
|---|---|
| reg_export.vm | A CLI that exports the raw content of a registry value to a file |
| regcool.vm | RegCool is a flexible editor for the Windows registry database. Link |
| registry_explorer.vm | Registry viewer with searching, multi-hive support, plugins, and more. Handles locked files |
| regshot.vm | Regshot is a registry comparison tool for tracking system changes by comparing registry snapshots. Link |
| total-registry.vm | Replacement for the Windows built-in Regedit.exe tool with improved features. |
| Package | Description |
|---|---|
| blobrunner.vm | BlobRunner is a simple tool to quickly debug shellcode extracted during malware analysis. |
| blobrunner64.vm | BlobRunner is a simple tool to quickly debug shellcode extracted during malware analysis. |
| scdbg.vm | scdbg is an emulation based shellcode API logger and debugger |
| sclauncher.vm | A small program to load 32-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode. |
| sclauncher64.vm | A small program to load 64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode. |
| shellcode_launcher.vm | Shellcode launcher utility |
| Package | Description |
|---|---|
| angr.vm | angr is a multi-architecture binary analysis toolkit providing features like disassembly, IR lifting, program instrumentation, symbolic execution, and decompilation. |
| apimonitor.vm | API Monitor lets you monitor and control API calls made by applications and services. |
| bstrings.vm | Find them strings yo. Built in regex patterns. Handles locked files |
| capa-explorer-web.vm | Web interface for exploring and understanding capa results |
| capa.vm | capa detects capabilities in executable files. You run it against a PE file or shellcode and it tells you what it thinks the program can do. |
| cryptotester.vm | Utility tool for performing cryptanalysis with a focus on ransomware cryptography |
| cyberchef.vm | The Cyber Swiss Army Knife - a web app for encryption, encoding, compression, data analysis, and more. |
| keystone.vm | Keystone is a Python library providing a multi-platform, multi-architecture assembler. |
| map.vm | Handful of small utility type applications useful for analyzing malicious code. |
| pdbresym.vm | PDBReSym simplifies and optimizes interacting with the Microsoft Symbol Server to download PDBs. Link |
| pma-labs.vm | Binaries for the book Practical Malware Analysis |
| procdot.vm | Creates visual graphs from procmon output |
| rat-king-parser.vm | multi-family RAT config parser/extractor |
| resourcehacker.vm | Resource Hacker is a resource editor for 32bit and 64bit Windows applications. |
| rpcview.vm | RpcView is an open-source tool to explore and decompile all RPC functionalities present on a Microsoft system |
| sqlitebrowser.vm | Open source tool to create, design, and edit database files compatible with SQLite. |
| sysinternals.vm | Sysinternals suite. |
| systeminformer.vm | A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. |
| vnc-viewer.vm | Tool for connecting to and interacting with VNC servers. |
| winscp.vm | WinSCP is an open source free SFTP client, SCP client, FTPS client and FTP client for Windows. Its main function is file transfer between a local and a remote computer. |
| yara.vm | YARA helps identify and classify malware by creating rules based on textual or binary patterns. |
| Package | Description |
|---|---|
| vb-decompiler-lite.vm | VB Decompiler is a decompiler for Visual Basic, VB.NET and C# applications. Link |
| vbdec.vm | VBDec is a VB File format viewer, P-Code Disassembler and debugger. Link |
| Package | Description |
|---|---|
| burp-free.vm | Burp Suite Community Edition is the free version of the platform for web application security testing, used to find and exploit vulnerabilities. Link |
| Package | Description |
|---|---|
| fuzzdb.vm | FuzzDB is the most comprehensive open dictionary of fault injection patterns, predictable resource locations, and regex for matching server responses. |
| payloadsallthethings.vm | A list of useful payloads and bypasses for Web Application Security. |
| seclists.vm | SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. |
| statistically-likely-usernames.vm | This resource contains wordlists for creating statistically likely usernames for use in username-enumeration, simulated password-attacks and other security testing tasks. |
| Package | Description |
|---|---|
| codetrack.vm | CodeTrack is a free .NET Performance Profile and Execution Analyzer. Link |
| de4dot-cex.vm | de4dot CEx is a de4dot fork with full support for vanilla ConfuserEx. Link |
| dnlib.vm | dnlib is a .NET module/assembly reader/writer library. Link |
| dnspyex.vm | dnSpyEx is a unofficial continuation of the dnSpy project which is a debugger and .NET assembly editor. Link |
| dotdumper.vm | DotDumper is an automatic unpacker and logger for DotNet Framework targeting files. Link |
| dotnet-6.vm | .NET 6. |
| dotnet-8.vm | .NET 8. |
| dotnet-9.vm | .NET 9. |
| extreme_dumper.vm | ExtremeDumper is a .NET Assembly Dumper from memory of processes. Link |
| garbageman.vm | GarbageMan is a set of tools designed for .NET heap analysis. Link |
| ilspy.vm | ILSpy is a .NET assembly browser and decompiler. Link |
| net-reactor-slayer.vm | NETReactorSlayer is a deobfuscator and unpacker for Eziriz .NET Reactor. Link |
| psnotify.vm | psnotify is a POC tool to fight .NET anti-dumping tricks. Link |
| rundotnetdll.vm | RunDotNetDll is a utility to list all methods of a given .NET Assembly and to invoke them. Link |
| sfextract.vm | sfextract extracts contents (assemblies, configuration, etc.) from .NET single file bundles. Link |