InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
☆590Mar 31, 2026Updated last month
Alternatives and similar repositories for InviZzzible
Users that are interested in InviZzzible are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆444Mar 31, 2026Updated last month
- Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that…☆3,888Jun 21, 2024Updated last year
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,933Apr 1, 2026Updated last month
- Source from VMDE paper, adapted to 2015☆188Dec 18, 2017Updated 8 years ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆222Mar 31, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- zer0m0n driver for cuckoo sandbox☆86Jul 12, 2016Updated 9 years ago
- Windows kernel and user mode emulation.☆1,949Apr 8, 2026Updated 3 weeks ago
- Anti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of v…☆67Mar 31, 2026Updated last month
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆820Mar 16, 2024Updated 2 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,119Jul 10, 2024Updated last year
- A static analyzer for PE executables.☆1,122Mar 11, 2026Updated last month
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,646Apr 18, 2026Updated 2 weeks ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆848Mar 11, 2021Updated 5 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,982Apr 23, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AV/EDR evasion via direct system calls.☆2,008Jan 1, 2023Updated 3 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆476Jun 16, 2023Updated 2 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆935Jun 1, 2021Updated 4 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆295Jun 27, 2017Updated 8 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆462Nov 22, 2018Updated 7 years ago
- zer0m0n driver for cuckoo sandbox☆368May 19, 2015Updated 10 years ago
- Malware Configuration And Payload Extraction☆760Nov 22, 2024Updated last year
- Script to create templates to use with VirtualBox to make vm detection harder☆770Nov 5, 2022Updated 3 years ago
- DRAKVUF Black-box Binary Analysis☆1,228Mar 5, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Demos of various injection techniques found in malware☆791Feb 15, 2022Updated 4 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆740Mar 17, 2019Updated 7 years ago
- Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping…☆578Feb 23, 2026Updated 2 months ago
- A YARA-integrated process denial framework for Windows☆397Feb 15, 2020Updated 6 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,263Mar 26, 2026Updated last month
- Universal Unhooking☆326Sep 19, 2018Updated 7 years ago
- Various snippets created during malware analysis☆466Oct 3, 2025Updated 6 months ago
- A more stealthy variant of "DLL hollowing"☆365Mar 8, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆2,182Apr 3, 2026Updated 3 weeks ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,215Jun 17, 2022Updated 3 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,519Nov 15, 2023Updated 2 years ago
- A tool to detect and crash Cuckoo Sandbox☆297Jul 22, 2024Updated last year
- ☆119Aug 7, 2022Updated 3 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,349Apr 18, 2026Updated 2 weeks ago
- Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness☆532Apr 3, 2026Updated 3 weeks ago