Repository navigation
anti-vm
- Website
- Wikipedia
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-------> RAFEL<------ Android Rat Written in Java With WebPanel For Controlling Victims...Hack Android Devices
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package. Windows ONLY.
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
.NET Project containing plenty of advanced techniques to detect various types of malicious actions on your software, with syscall support.
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
Detects virtual machines and malware analysis environments
A Malware Scarecrow for Windows 10/11 with a user-friendly touch.
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.
It is demonstration tool that contains collection techniques to detect the virtualisation environment in Linux Operating System.
Some anti QEMU trick used by in-the-wild malware.
EQU8 User-Mode Bypass and Injector
A pintool for protecting a sandbox application of common anti-virtualmachine and anti-sandbox detection techniques
Apate performs anti-debugging, anti-VM and anti-sandbox tests, to see if your linux system is able to stay under the radar.
This repository contains the c# code which is using latest persistence technique and multiple anti-vm, anti-sandboxes techniques. Creating persistence by using WindowsApps folder, schtasks, powershell cmdlet (Get-Variable).
Effective cloud sandbox detection from ring 3
Windows-based implementation of several anti-vm techniques used in malware development.
A trojan downloader which will download any file using a direct download link stealthily. The final size of the payload will be less than 10 mb.