Builds malware analysis Windows VMs so that you don't have to.
BlackHat USA Arsenal 2019 [late] Edition!
Action: issues created and resolved | full diff
Thanks to the following people who contributed to this release:
Etienne Lacroix, Michael Seborowski, Olivier Bilodeau and Maxime Carbonneau
The SecTor 2018 edition
profile-example.js
for syntax. (#85)PACKER_CACHE_DIR
environment variable will be honored if present (#99, #100)fiddler4
and processhacker
chocolatey package (#89, #94)jinja2.exceptions.TemplateNotFound: snippets/builder_vsphere_windows.json
(#71)Action: issues created and resolved | full diff
Thanks to the following people who contributed to this release:
Camille Moncelier, Hugo Genesse, Mathieu Tarral, Olivier Bilodeau, PiX, snakems
The BlackHat USA Arsenal 2017 edition
Come to our session to talk about the tool!
Action: issues created and resolved | full diff
Thanks to the following people who contributed to this release:
Gregory Leblanc, @xambroz, @malwarenights, Hugo Genesse and Olivier Bilodeau
The #RSAC gift release
See announcement blog post here: https://gosecure.net/2017/02/16/introducing-malboxes-a-tool-to-build-malware-analysis-virtual-machines/
Released by @obilodeau on 2017-02-16.
Thanks to the following people who contributed to this release:
Olivier Bilodeau, Hugo Genesse
NorthSec 2016 edition
First proof of concept release of malboxes.
We can build Windows 7 and Windows 10 virtual machines with useful malware analysis tools pre-installed. Without a license key it will use the evaluation version of Windows 10 which is automatically downloaded.
Thanks to the following people who contributed to this release:
Olivier Bilodeau, Hugo Genesse