CheckPointSW / InviZzzibleLinks
InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
☆571Updated 3 years ago
Alternatives and similar repositories for InviZzzible
Users that are interested in InviZzzible are comparing it to the libraries listed below
Sorting:
- Dynamic unpacker based on PE-sieve☆760Updated last week
- Live hunting of code injection techniques☆383Updated 6 years ago
- A static analyzer for PE executables.☆1,085Updated last year
- Quickly debug shellcode extracted during malware analysis☆614Updated 2 years ago
- ☆821Updated 5 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆822Updated 3 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆458Updated 6 years ago
- "Screwed Drivers" centralized information source for code references, links, etc.☆366Updated 5 years ago
- zer0m0n driver for cuckoo sandbox☆363Updated 10 years ago
- A memory scanning evasion technique☆888Updated 8 years ago
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆424Updated 5 years ago
- DRAKVUF Black-box Binary Analysis☆1,159Updated 2 weeks ago
- Portable Executable parsing library (from PE-bear)☆657Updated 3 weeks ago
- Script to create templates to use with VirtualBox to make vm detection harder☆758Updated 2 years ago
- Demos of various injection techniques found in malware☆796Updated 3 years ago
- A Binary Genetic Traits Lexer Framework☆515Updated last month
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆629Updated 3 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆433Updated last year
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆255Updated 2 years ago
- Generating YARA rules based on binary code☆215Updated 3 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆631Updated 2 weeks ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆506Updated last year
- Combination of different utilities, have fun!☆215Updated last year
- Incident Response & Digital Forensics Debugging Extension☆383Updated 6 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,200Updated last week
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆740Updated 6 years ago
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆308Updated last year
- Malduck is your ducky companion in malware analysis journeys☆342Updated 3 months ago
- The new Cuckoo Monitor.☆348Updated last year