CheckPointSW / Evasions
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
☆394Updated 6 months ago
Alternatives and similar repositories for Evasions:
Users that are interested in Evasions are comparing it to the libraries listed below
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆729Updated 3 years ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆720Updated 10 months ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆689Updated 4 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆778Updated 3 years ago
- Expriments☆455Updated 3 months ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆585Updated 2 years ago
- Quickly debug shellcode extracted during malware analysis☆575Updated last year
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆418Updated 4 years ago
- Dynamic unpacker based on PE-sieve☆688Updated last week
- Research on Anti-malware and other related security solutions☆259Updated 4 years ago
- ☆463Updated last year
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆350Updated 2 months ago
- ☆291Updated 3 years ago
- Extract Windows Defender database from vdm files and unpack it☆433Updated 4 years ago
- Live hunting of code injection techniques☆378Updated 5 years ago
- ☆802Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,113Updated last year
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆800Updated 2 years ago
- ☆739Updated last year
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆637Updated 10 months ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆172Updated last month
- ☆477Updated 7 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆178Updated 2 years ago
- collect for learning cases☆571Updated 7 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆556Updated this week
- Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]☆595Updated 2 years ago
- A way to delete a locked file, or current running executable, on disk.☆508Updated 5 months ago
- AV/EDR evasion via direct system calls.☆1,831Updated 2 years ago