Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
翻译 - 野外使用的公共恶意软件技术:虚拟机,仿真,调试器,沙盒检测。
#安卓#-------> RAFEL<------ Android Rat Written in Java With WebPanel For Controlling Victims...Hack Android Devices
翻译 - -------> rafel <------ Android rat用WebPanel编写的Java,用于控制受害者
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package. Windows ONLY.
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided...
.NET Project containing plenty of advanced techniques to detect various types of malicious actions on your software, with syscall support.
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
Detects virtual machines and malware analysis environments
A Malware Scarecrow for Windows 10/11 with a user-friendly touch.
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.
It is demonstration tool that contains collection techniques to detect the virtualisation environment in Linux Operating System.
Some anti QEMU trick used by in-the-wild malware.
EQU8 User-Mode Bypass and Injector
A pintool for protecting a sandbox application of common anti-virtualmachine and anti-sandbox detection techniques
Apate performs anti-debugging, anti-VM and anti-sandbox tests, to see if your linux system is able to stay under the radar.
This repository contains the c# code which is using latest persistence technique and multiple anti-vm, anti-sandboxes techniques. Creating persistence by using WindowsApps folder, schtasks, powershell...
Effective cloud sandbox detection from ring 3
Windows-based implementation of several anti-vm techniques used in malware development.
A trojan downloader which will download any file using a direct download link stealthily. The final size of the payload will be less than 10 mb.