Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
翻译 - 野外使用的公共恶意软件技术:虚拟机,仿真,调试器,沙盒检测。
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided...
.NET Project containing plenty of advanced techniques to detect various types of malicious actions on your software, with syscall support.
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
Detects virtual machines and malware analysis environments
Detect virtual environment
A Malware Scarecrow for Windows 10/11 with a user-friendly touch.
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.
Some anti QEMU trick used by in-the-wild malware.
Some anti-sandbox techniques implemented in Golang.
Binary obfuscation, anti-reversing, anti-debugging and av-bypass framework for Windows
Apate performs anti-debugging, anti-VM and anti-sandbox tests, to see if your linux system is able to stay under the radar.
A pintool for protecting a sandbox application of common anti-virtualmachine and anti-sandbox detection techniques
This repository contains the c# code which is using latest persistence technique and multiple anti-vm, anti-sandboxes techniques. Creating persistence by using WindowsApps folder, schtasks, powershell...
Effective cloud sandbox detection from ring 3
#seccamp 2014 CTF softsec (Reverse 400pt)
Attempts to trick malware using techniques from NavyTitanium/Fake-Sandbox-Artifacts
This repo consists of a malware attack strategy, using encoding and encryption algorithms. Inspiration was taken from the BEEP malware, but implementation is varied.