S12cybersecurity / AntiVMLinks
C++ Class with various techniques to detect the execution in a virtualized environment
☆13Updated last year
Alternatives and similar repositories for AntiVM
Users that are interested in AntiVM are comparing it to the libraries listed below
Sorting:
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆13Updated 11 months ago
- My Own VirtualAlloc Implementation to use as alternative unknown for all the defense solutions of VirtualAlloc Win32 API Function☆9Updated last year
- PDF Icon File Type Spoofer☆16Updated 11 months ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- kASLR bypass technique on Intel CPUs.☆14Updated last month
- PoC for the Untrusted Pointer Dereference in the appid.sys driver☆16Updated last year
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Collection of Win32 with C++/Assembly for Hooking, Patch and Reversing PE file☆12Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆21Updated 2 months ago
- what the fuck is this shit☆24Updated 9 years ago
- C++ Script to list active processes with name, PID, Parent PID and User running it☆10Updated 2 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆22Updated last year
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆15Updated 4 months ago
- Compile-Time Calls Obfuscator for C++14+☆48Updated last year
- C++ keylogger to save all the keys pressed into a local txt file☆11Updated 2 years ago
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆32Updated 8 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆22Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago
- ⚙️ Map and execute EXE in memory☆10Updated 2 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- TaskMgr Volatile Environment LPE☆13Updated 6 months ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 5 years ago
- using the gpu to hide your payload☆59Updated 2 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆78Updated this week
- stop any process from looking into your process by hooking.☆19Updated last year
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆18Updated 11 months ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆31Updated last year