CheckPointSW / InviZzzible
InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
☆555Updated 3 years ago
Alternatives and similar repositories for InviZzzible
Users that are interested in InviZzzible are comparing it to the libraries listed below
Sorting:
- Dynamic unpacker based on PE-sieve☆730Updated last month
- Live hunting of code injection techniques☆382Updated 5 years ago
- Quickly debug shellcode extracted during malware analysis☆603Updated last year
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆811Updated 3 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆405Updated 10 months ago
- A static analyzer for PE executables.☆1,063Updated last year
- Portable Executable parsing library (from PE-bear)☆658Updated 2 weeks ago
- "Screwed Drivers" centralized information source for code references, links, etc.☆356Updated 5 years ago
- zer0m0n driver for cuckoo sandbox☆360Updated 9 years ago
- Demos of various injection techniques found in malware☆791Updated 3 years ago
- ☆813Updated 5 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆741Updated 6 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆451Updated 6 years ago
- A memory scanning evasion technique☆865Updated 7 years ago
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆420Updated 4 years ago
- A tool to detect and crash Cuckoo Sandbox☆293Updated 9 months ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆609Updated 2 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆579Updated last month
- A Pin Tool for tracing API calls etc☆1,421Updated 2 weeks ago
- Binee: binary emulation environment☆517Updated 2 years ago
- Obfuscate specific windows apis with different apis☆999Updated 4 years ago
- Malduck is your ducky companion in malware analysis journeys☆331Updated last week
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆701Updated 4 years ago
- metame is a metamorphic code engine for arbitrary executables☆581Updated 5 years ago
- Combination of different utilities, have fun!☆213Updated last year
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆498Updated 11 months ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,217Updated 2 months ago
- Generating YARA rules based on binary code☆210Updated 3 years ago
- Source from VMDE paper, adapted to 2015☆182Updated 7 years ago
- Automatic and platform-independent unpacker for Windows binaries based on emulation☆693Updated 7 months ago