Установка
python -m venv venvОписание
# LitterBox  []() []() []() []() []() [](https://deepwiki.com/BlackSnufkin/LitterBox) [](https://github.com/BlackSnufkin/LitterBox/stargazers) ## Table of Contents - [Overview](#overview) - [Documentation](#documentation) - [Analysis Capabilities](#analysis-capabilities) - [Analysis Engines](#analysis-engines) - [Integrated Tools](#integrated-tools) - [API Reference](#api-reference) - [Installation](#installation) - [Windows Installation](#windows-installation) - [Linux Installation (Docker)](#linux-installation) - [Configuration](#configuration) - [Client Libraries](#client-libraries) - [Contributing](#contributing) - [Security Advisory](#security-advisory) - [Acknowledgments](#acknowledgments) - [Interface](#interface) ## Overview LitterBox provides a controlled sandbox environment designed for security professionals to develop and test payloads. This platform allows red teams to: * Test evasion techniques against modern detection techniques * Validate detection signatures before field deployment * Analyze malware behavior in an isolated environment * Keep payloads in-house without exposing them to external security vendors * Ensure payload functionality without triggering production security controls The platform includes LLM-assisted analysis capabilities through the LitterBoxMCP server, offering advanced analytical insights using natural language processing technology. **Note**: While designed primarily for red teams, LitterBox can be equally valuable for blue teams by shifting perspective – using the same tools in their malware analysis workflows. ## Documentation **[LitterBox Wiki](../../wiki)** - Advanced configuration and technical guides Key sections: - **Scanner Configuration** - HolyGrail, Blender, and FuzzyHash setup - **YARA Rules Management** - Custom rules and organization - **Configuration Reference** - Complete config.yml options - **Architecture & Development** - System design and custom scanners ## Analysis Capabilities ### Initial Processing | Feature | Description | |---------|-------------| | File Identification | Multiple hashing algorithms (MD5, SHA256) | | Entropy Analysis | Detection of encryption and obfuscation | | Type Classification | Advanced MIME and file type analysis | | Metadata Preservation | Original filename and timestamp tracking | | Runtime detection | Compiled binary identification ### Executable Analysis For Windows PE files (.exe, .dll, .sys): - Architecture identification (PE32/PE32+) - Compilation timestamp verification - Subsystem classification - Entry point analysis - Section enumeration and characterization - Import/export table mapping - Runtime detection for Go and Rust binaries with specialized import analysis ### Document Analysis For Microsoft Office files: - Macro detection and extraction - VBA code security analysis - Hidden content identification - Obfuscation technique detection ### LNK Analysis For Windows shortcut Files (.lnk) - Target execution paths and arguments - Machine tracking identifiers - Timestamps and file attributes - Network share information - Volume and drive details - Environment variables and metadata ## Analysis Engines ### Static Analysis - Industry-standard signature detection - Binary entropy profiling - String extraction and classification - Pattern matching for known indicators ### Dynamic Analysis Available in dual operation modes: - **File Analysis**: Focused on submitted samples - **Process Analysis**: Targeting running processes by PID Capabilities include: - Runtime behavioral monitoring - Memory region inspection and classification - Process hollowing detection - Code injection technique identification - Sleep pattern analysis - Windows telemetry collection via ETW ### HolyGrail BYOVD Analysis Find undetected legitimate drivers for BYOVD attacks: - **LOLDrivers Database**: Cross-reference against known vulnerable drivers - **Windows Block Policy**: Validation against Microsoft's recommended driver block rules for Windows 10/11 - **Dangerous Import Analysis**: Detection of privileged functions commonly exploited in BYOVD attacks - **BYOVD Score Calculation**: Risk assessment based on exploitation potential and defensive controls ### Doppelganger Analysis #### B
Отзывы (0)
Пока нет отзывов. Будьте первым!
Статистика
Информация
Технологии
Похожие серверы
GitHub MCP
Полная интеграция с GitHub API: репозитории, issues, pull requests, actions и многое другое.
Filesystem MCP
Безопасный доступ к файловой системе для чтения, записи и управления файлами с настраиваемыми разрешениями.
Context7 MCP
Доступ к актуальной документации библиотек и фреймворков.
Serena MCP
Мощный MCP сервер для семантической навигации по коду и рефакторинга.