S12cybersecurity / AntiVMLinks
C++ Class with various techniques to detect the execution in a virtualized environment
☆13Updated last year
Alternatives and similar repositories for AntiVM
Users that are interested in AntiVM are comparing it to the libraries listed below
Sorting:
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆13Updated last year
- My Own VirtualAlloc Implementation to use as alternative unknown for all the defense solutions of VirtualAlloc Win32 API Function☆9Updated last year
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆22Updated last year
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- Windows Syscall SDK with dynamic offset resolution, syscall validation, obfuscation, and more!☆25Updated 2 weeks ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆20Updated 3 years ago
- PoC for the Untrusted Pointer Dereference in the appid.sys driver☆20Updated last year
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆17Updated 2 years ago
- C++ Script to list active processes with name, PID, Parent PID and User running it☆10Updated 2 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆19Updated 4 years ago
- Collection of Win32 with C++/Assembly for Hooking, Patch and Reversing PE file☆15Updated 2 years ago
- PDF Icon File Type Spoofer☆16Updated last year
- NTAPI hook bypass with (semi) legit stack trace☆16Updated 2 years ago
- what the fuck is this shit☆25Updated 9 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆12Updated 2 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- TaskMgr Volatile Environment LPE☆14Updated 2 weeks ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆22Updated 2 months ago
- ☆25Updated 8 months ago
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆23Updated last year
- filter driver to hide files and directories☆20Updated last year
- Hook system calls on Windows by using Kaspersky's hypervisor☆12Updated 6 months ago
- Скрытие процессов и файлов в user mode☆23Updated 5 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆18Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆31Updated 11 months ago
- stop any process from looking into your process by hooking.☆21Updated last year
- Header only library for obfuscation import winapi functions.☆41Updated 5 months ago
- ☆21Updated 3 years ago