Loading...
Browse 23 virtual machine tools
Hardened OS providing trusted execution environment for VMs in clouds.
VMI streams a virtual Android workspace to BYOD devices, storing zero data locally.
Server-hosted mobile virtualization platform delivering apps via thin client.
Custom hypervisor for stealth malware analysis on VMs and bare metal.
Hardware-based confidential VMs for secure, isolated cloud workloads.
Sandboxed browser in a VM to block malware, keyloggers & Trojans.
Cloud network security gateway for virtual & hybrid environments via Check Point.
Pre-configured VM for testing attacks with real-time telemetry monitoring
Enterprise backup and disaster recovery solution for physical, virtual, and SaaS
Virtual NGFW for public/private cloud with RTDMI threat detection
Virtual machine for secure, anonymous dark web investigation via Tor and I2P
Cloud-native WAAP protecting web apps & APIs against OWASP Top 10 & threats
VMCloak is a tool for creating and preparing Virtual Machines for Cuckoo Sandbox.
DetectionLab is a pre-configured Windows domain environment with security tooling and logging designed for cybersecurity training and detection capability development.
SecGen is an open-source framework that automatically generates vulnerable virtual machines and hacking challenges for cybersecurity education and penetration testing training.
Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis with various tools and resources.
A library and tools to access and manipulate VMware Virtual Disk (VMDK) files.
FLARE-VM is a Windows virtual machine setup tool that automates the installation and configuration of reverse engineering and malware analysis software using Chocolatey and Boxstarter technologies.
A honeypot system that simulates RDP services on port 3389, automatically assigns virtual machines to incoming connections, and captures comprehensive forensic data including packet captures and disk images.
A library for read-only access to QEMU Copy-On-Write (QCOW) image files, supporting multiple versions and compression formats for digital forensics analysis.
An educational workshop providing hands-on training materials, lab environments, and tools for learning local privilege escalation techniques on Windows and Linux systems.
Get strategic cybersecurity insights in your inbox