Hunting for VMware artifacts based on its valid file,drivers certificate and registry keys value & description , running processes & services, Serial Number ,address MAC, , it's usefull for detecting Sandbox environment (VMware hypervisor in this case)
ellen2015 / vmwarehunting Goto Github PK
View Code? Open in Web Editor NEWThis project forked from hxlxmjxbbxs/vmwarehunting
Hunting for VMware artifacts based on its valid file,drivers certificate and registry keys value & description , running processes & services, Serial Number ,address MAC, , it's usefull for detecting Sandbox environment (VMware hypervisor in this case)