Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-
Updated
Mar 18, 2024 - C++
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-------> RAFEL<------ Android Rat Written in Java With WebPanel For Controlling Victims...Hack Android Devices
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
Detects virtual machines and malware analysis environments
MinegamesAntiCheat Are an Advanced C# Anti-Cheat Library which prevents debug attaching, dll-injection, etc..... and it can communicate with your server.
Some anti QEMU trick used by in-the-wild malware.
EQU8 User-Mode Bypass and Injector
A pintool for protecting a sandbox application of common anti-virtualmachine and anti-sandbox detection techniques
Apate performs anti-debugging, anti-VM and anti-sandbox tests, to see if your linux system is able to stay under the radar.
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
#seccamp 2014 CTF softsec (Reverse 400pt)
Windows-based implementation of several anti-vm techniques used in malware development.
Effective cloud sandbox detection from ring 3
Unwanted Execution Prevention - (Virustotal, etc)
A trojan downloader which will download any file using a direct download link stealthily. The final size of the payload will be less than 10 mb.
Add a description, image, and links to the anti-vm topic page so that developers can more easily learn about it.
To associate your repository with the anti-vm topic, visit your repo's landing page and select "manage topics."