Custom Windows based security distribution
Windows based VM for CTFs and ad hoc security testing and development
Base OS is Windows 10 Professional N
Can make this VM available on request. The OVF and disk are 24 GB.
Folder for dangerous binaries
-
Create Malware folder at C:\malware
-
Exclude C:\malware folder from real-time scanning in Windows Defender.
-
Set as non executable
icacls C:\malware /deny "Everyone:(OI)(IO)(X)"
Default Credentials
username: ixg
password: Password1
Software List
- 010editor
- 7zip
- Atom Text Editor
- Autopsy
- Burp Suite
- Bloodhound + Neo4j
- CantorDust (Ghidra Plugin)
- CCleaner
- Cyberchef
- Deep Sound
- Detect-it-Easy (DIE)
- dnSpyEx
- Firefox
- FTK Imager
- Ghidra
- Gimp
- gpg4win
- GRASSMARLIN
- Hayabusa
- IDA Free
- ImmunityDebugger (mona.py PyCommand)
- IrfanViewer
- Libreoffice
- Malcode Analyst Pack (MAP)
- Mimikatz
- MobaXterm
- NetworkMiner Free
- Notepad++
- O&O Shutup
- Ollydbg
- PEView
- PE Explorer
- PE Bear
- PE ID
- Putty
- Recuva
- Redline Fireeye
- Regshot
- SQLlitebrowser
- Sysinternals Suite
- Tor Browser
- UPX
- Veracrypt
- VMware VM Tools
- Volatility
- WELA
- Windows Terminal
- Wireshark
- x64dbg