| Crates.io | malware-traces-generator |
| lib.rs | malware-traces-generator |
| version | 1.0.0 |
| created_at | 2025-08-28 15:26:34.706113+00 |
| updated_at | 2025-08-28 15:26:34.706113+00 |
| description | Generate malware traces for detection tests |
| homepage | |
| repository | https://github.com/frack113/MalwareTracesGenerator/ |
| max_upload_size | |
| id | 1814235 |
| size | 158,326 |
MalwareTracesGenerator is a tool that helps you create malware traces for detection tests.
It's great for testing configurations, rules, or your Endpoint Detection and Response. It's not meant to fully simulate the behavior of malware, but to reproduce the steps that led to trace creation. By avoiding full and complex simulations, MalwareTracesGenerator is simple but still powerful.
This is just one way you can build the project yourself.
You'll need Cargo and the Windows SDK to get through the installation process.
This will install using crates.io. If you need more installation options, check out this page. To install it, just enter this command in your preferred terminal:
cargo install malware-traces-generator
Now that MalwareTracesGenerator is installed, you can start generating some traces! For example, you can spoof a process by doing the following:
mtg traces processes spoofing "cargo.exe" "explorer.exe"
Or you can generate traces from a configuration file:
mtg generate --file "traces.toml"
If you want to know more, check out the documentation.
The open source community is an awesome place to learn, inspire, and create, and we're grateful for any contributions you can make. If you're interested, we'd love your help with any kind of work.
Thanks to all the people who made the logo possible:
Distributed under the GPL 3.0 or later license.