CheckPointSW / InviZzzible
InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
☆542Updated 2 years ago
Alternatives and similar repositories for InviZzzible:
Users that are interested in InviZzzible are comparing it to the libraries listed below
- Dynamic unpacker based on PE-sieve☆688Updated last week
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆394Updated 6 months ago
- Live hunting of code injection techniques☆378Updated 5 years ago
- Quickly debug shellcode extracted during malware analysis☆575Updated last year
- zer0m0n driver for cuckoo sandbox☆357Updated 9 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆800Updated 2 years ago
- DRAKVUF Black-box Binary Analysis☆1,081Updated last month
- ☆802Updated 5 years ago
- Demos of various injection techniques found in malware☆791Updated 2 years ago
- "Screwed Drivers" centralized information source for code references, links, etc.☆344Updated 4 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,084Updated last month
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆493Updated 8 months ago
- A memory scanning evasion technique☆850Updated 7 years ago
- Portable Executable parsing library (from PE-bear)☆650Updated 4 months ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆736Updated 5 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆556Updated this week
- A static analyzer for PE executables.☆1,032Updated last year
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆418Updated 4 years ago
- A Binary Genetic Traits Lexer Framework☆465Updated this week
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,136Updated last year
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆585Updated 2 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,133Updated last month
- Various snippets created during malware analysis☆458Updated 2 years ago
- Expriments☆455Updated 3 months ago
- Windows kernel and user mode emulation.☆1,553Updated 9 months ago
- Binee: binary emulation environment☆509Updated last year
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆689Updated 4 years ago
- A Pin Tool for tracing API calls etc☆1,363Updated 2 weeks ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆778Updated 3 years ago
- Malduck is your ducky companion in malware analysis journeys☆323Updated 6 months ago