Cyber Scarecrow, making your computer look 'scary' to malware

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com

Judoscale - Save 47% on cloud hosting with autoscaling that just works
Judoscale integrates with Django, FastAPI, Celery, and RQ to make autoscaling easy and reliable. Save big, and say goodbye to request timeouts and backed-up task queues.
judoscale.com
featured
InfluxDB high-performance time series database
Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.
influxdata.com
featured
  1. Fake-Sandbox-Artifacts

    This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools

    I’m sure it’s closed source for the eventual plans to monetize it, but what’s the real difference to something like https://github.com/NavyTitanium/Fake-Sandbox-Artifacts and why can’t you at least name yourselves?

    Not many software promises to fend off attackers, asks for an email address before download, and creates a bunch of processes using a closed source dll the existence of which can easily be checked.

    Then again, not many malware targeting consumers at random check for security software. You are more likely to see a malware stop working if you fake the amount of ram and cpu and your network driver vendor than if you have CrowdStrike, etc. running.

  2. Judoscale

    Save 47% on cloud hosting with autoscaling that just works. Judoscale integrates with Django, FastAPI, Celery, and RQ to make autoscaling easy and reliable. Save big, and say goodbye to request timeouts and backed-up task queues.

    Judoscale logo
  3. MaleX

    A curated dataset of malware and benign Windows executable samples for malware researchers

    Sounds like a very interesting concept. I'd like to see someone actually test this though.

    Try running this on a Windows PC with Windows Defender off & just Scarecrow running. You could use the MaleX test kit [1] or a set of malware such as the Zoo collection [2] or something more current. I'd be very interested to see how many malware executables stop half way through their installation after seeing a few bogus registry entries/background programs running. I'm not trying to imply it's worthless, but it needs some actual "real world" test results.

    [1] https://github.com/Mayachitra-Inc/MaleX

  4. theZoo

    A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.

  5. vercel

    Develop. Preview. Ship.

  6. ScareCrow

    ScareCrow - Payload creation framework designed around EDR bypass. (by Tylous)

    Obviously this should be an open source tool that people can build for themselves. If you want to sell premium services or upgrades for it later, you need to have an open/free tier as well.

    Also are you aware of the (very awesome) EDR evasion toolkit called scarecrow? Naming stuff is hard, I get that, but this collision is a bit much IMO.

    https://github.com/Tylous/ScareCrow

  7. odoshi

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Malware Analysis: CryptoLocker

    1 project | dev.to | 29 Dec 2024
  • Source Code of $3k-a-Month macOS Malware 'Banshee Stealer' Leaked

    1 project | news.ycombinator.com | 1 Dec 2024
  • Creación de un agente de cafetería con Amazon Bedrock y Shopify

    3 projects | dev.to | 25 Oct 2024
  • Semantra: Multipurpose tool for semantically searching documents

    1 project | news.ycombinator.com | 4 Sep 2024
  • Show HN: Open-source alternative to HashiCorp/IBM Vault

    4 projects | news.ycombinator.com | 24 Apr 2024

Did you know that Python is
the 2nd most popular programming language
based on number of references?