EvilBytecode / PyDefender
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.
☆52Updated last week
Alternatives and similar repositories for PyDefender:
Users that are interested in PyDefender are comparing it to the libraries listed below
- ☆24Updated 6 months ago
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆30Updated 6 months ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆39Updated 7 months ago
- ☆31Updated 7 months ago
- simple user-mode Rootkit☆103Updated 2 years ago
- Stealer in c++.☆36Updated last week
- codecave hook reverse engineering toolkit.☆36Updated last year
- Makes IDA (most versions) to crash upon opening it.☆85Updated 8 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆75Updated this week
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆22Updated 4 months ago
- Detects virtual machines and malware analysis environments☆127Updated 2 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆38Updated 2 months ago
- Decrypting yandex browser passwords☆17Updated last month
- Standalone Metasploit-like XOR encoder for shellcode☆48Updated 11 months ago
- PoC Anti-Rootkit/Anti-Cheat Driver.☆190Updated last week
- A universal binary patching dll.☆86Updated 6 months ago
- Windows AppLocker Driver (appid.sys) LPE☆55Updated 9 months ago
- Advanced dynamic malware analysis tool.☆83Updated last year
- reverse engineering random malwares☆23Updated 3 months ago
- x86-64 virtualizing obfuscator written in Rust☆77Updated last year
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆65Updated last year
- Scan for potentially vulnerable drivers☆86Updated 3 years ago
- Scripts for statically unpacking Pyarmor v8+☆51Updated last week
- spoof return address☆74Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 9 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆70Updated 5 months ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆59Updated last year
- Ransomware written in go, encrypt - decrypt.☆20Updated last week
- PoC for the Untrusted Pointer Dereference in the appid.sys driver☆16Updated last year