Skip to content

πŸ“¦ An automated, containerized Windows malware detonation sandbox using Docker, QEMU, and KVM. Features ephemeral snapshots for safe, high-frequency dynamic analysis.

Notifications You must be signed in to change notification settings

PanLuvme/pokiSEC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

43 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

logo

πŸ“¦ A happy little sandbox for not-so-happy files.

License: MIT Docker KVM Support Buy Me A Coffee

πŸ“– Introduction

pokiSEC is a lightweight, containerized sandbox designed for safe dynamic malware analysis. It uses QEMU and Docker to build a completely isolated Windows VM that streams directly to your browser tab.

Safely detonate malware, test suspicious executables, or analyze phishing links. When you're done, just close the containerβ€”poof! The entire environment is wiped clean, leaving no trace on your host machine.

❓ How to use

check recent releases


πŸ— Architecture

pokiSEC leverages kernel-level virtualization (KVM) passed through a Docker container to achieve near-native performance for the Windows guest, while keeping the network stack isolated.

graph LR
    %% Styling
    classDef container fill:#0f172a,stroke:#38bdf8,stroke-width:2px,color:#fff,rx:5px;
    classDef innerBox fill:#1e293b,stroke:#0ea5e9,stroke-width:1px,color:#fff,rx:5px,stroke-dasharray: 5 5;
    classDef malware fill:#ef4444,stroke:#7f1d1d,stroke-width:2px,color:#fff,rx:5px;
    classDef component fill:#3b82f6,stroke:#1d4ed8,stroke-width:2px,color:#fff,rx:5px;
    classDef user fill:#22c55e,stroke:#14532d,stroke-width:2px,color:#fff;

    %% External User
    User([πŸ‘€ User]) -->|:8080| Web[🌐 Web UI]

    %% Main Docker Container
    subgraph Docker ["πŸ“¦ Docker Container"]
        direction LR
        Web --> QEMU[βš™οΈ QEMU]
        QEMU --> KVM[πŸ”Œ KVM]
        
        %% The Nested Box You Wanted (Restored)
        subgraph Guest ["πŸͺŸ Windows Environment"]
            direction TB
            QEMU --> WinVM[πŸ’» Win 10]
            WinVM -->|Executes| Malware[🦠 Malware]
        end
    end

    %% Logic Flow
    Malware -.-> Snapshot[πŸ“Έ Snap]
    Reset[πŸ›‘ Stop] -->|Reverts| Snapshot

    %% Apply Styles
    class Docker container;
    class Guest innerBox;
    class Malware,Snapshot malware;
    class WinVM,QEMU,KVM,Web component;
    class User user;
Loading

TODO:

  • Adding Drag and Drop ISO generation to bring a backpack of Malware into the Isolation.
  • Adding network simulation
  • Adding logs

About

πŸ“¦ An automated, containerized Windows malware detonation sandbox using Docker, QEMU, and KVM. Features ephemeral snapshots for safe, high-frequency dynamic analysis.

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published