This repository provides resources and scripts for setting up a self-hosted malware analysis lab using VirtualBox, Windows 10 Enterprise, REMnux, and Flare VM. For detailed step-by-step instructions, please refer to my blog post: Building Your Self-Hosted Malware Analysis Lab with VirtualBox.
- REMnux: Get REMnux
- Windows 10 Enterprise: Download Windows 10 Enterprise
- VirtualBox: Download VirtualBox
Follow the detailed setup instructions in my blog post: Building Your Self-Hosted Malware Analysis Lab with VirtualBox.
- Install VirtualBox and Set Up Windows 10 Enterprise.
- Prepare Windows for Flare VM:
- Disable Proxy Settings, Windows Defender, and modify Group Policies.
- Take a snapshot of your setup.
- Install Flare VM using the provided PowerShell script.
- Set Up REMnux in VirtualBox.
- Configure REMnux for network services.
- Create a Private Network in VirtualBox and configure network settings.
/etc/inetsim/inetsim.conf sh Copy code
#start_service dns service_bind_address 0.0.0.0 dns_default_ip 10.0.0.4
Create a Host-only network with the following settings: Adapter IP: 10.0.0.10 DHCP Server: Enabled Server Address: 10.0.0.2 Lower Bound: 10.0.0.3 Upper Bound: 10.0.0.254
Verify Connectivity: Ensure REMnux and Flare VM can communicate. DNS Configuration: Set Flare VM DNS server address to 10.0.0.4.
##Disclaimer I take no responsibility or accountability for the infection of malicious software, programs, or files onto any computer or workstation. This project is for educational purposes only. I do not condone the development, use, or spreading of programs to intentionally harm assets, networks, or individuals.
License This project is licensed under the MIT License - see the LICENSE file for details.