CheckPointSW / InviZzzible
InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
☆546Updated 2 years ago
Alternatives and similar repositories for InviZzzible:
Users that are interested in InviZzzible are comparing it to the libraries listed below
- Dynamic unpacker based on PE-sieve☆705Updated last week
- Live hunting of code injection techniques☆380Updated 5 years ago
- Quickly debug shellcode extracted during malware analysis☆582Updated last year
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆398Updated 7 months ago
- zer0m0n driver for cuckoo sandbox☆358Updated 9 years ago
- DRAKVUF Black-box Binary Analysis☆1,093Updated this week
- Demos of various injection techniques found in malware☆790Updated 3 years ago
- A memory scanning evasion technique☆855Updated 7 years ago
- ☆801Updated 5 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆738Updated 5 years ago
- Portable Executable parsing library (from PE-bear)☆652Updated 5 months ago
- Combination of different utilities, have fun!☆208Updated last year
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆418Updated 4 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆801Updated 2 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆592Updated 2 years ago
- "Screwed Drivers" centralized information source for code references, links, etc.☆349Updated 4 years ago
- Binee: binary emulation environment☆513Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆566Updated 2 weeks ago
- Obfuscate specific windows apis with different apis☆993Updated 4 years ago
- A Pin Tool for tracing API calls etc☆1,380Updated 2 weeks ago
- A static analyzer for PE executables.☆1,043Updated last year
- A Binary Genetic Traits Lexer Framework☆487Updated last week
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆694Updated 4 years ago
- A tool to detect and crash Cuckoo Sandbox☆289Updated 6 months ago
- Script to create templates to use with VirtualBox to make vm detection harder☆734Updated 2 years ago
- Generating YARA rules based on binary code☆205Updated 3 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,095Updated this week
- Source from VMDE paper, adapted to 2015☆180Updated 7 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,157Updated this week
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆247Updated last year