Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
☆3,873Jun 21, 2024Updated last year
Alternatives and similar repositories for pafish
Users that are interested in pafish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,905Apr 1, 2026Updated last week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,959Apr 2, 2026Updated last week
- Script to create templates to use with VirtualBox to make vm detection harder☆769Nov 5, 2022Updated 3 years ago
- InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date…☆590Mar 31, 2026Updated last week
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,597Apr 1, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆294Jun 27, 2017Updated 8 years ago
- Vmware Hardened VM detection mitigation loader (anti anti-vm)☆2,225Dec 2, 2022Updated 3 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆462Nov 22, 2018Updated 7 years ago
- Windows kernel and user mode emulation.☆1,921Mar 31, 2026Updated last week
- VirtualBox VM detection mitigation loader☆967Apr 2, 2023Updated 3 years ago
- A static analyzer for PE executables.☆1,117Mar 11, 2026Updated 3 weeks ago
- Defund the Police.☆13,587Jun 7, 2024Updated last year
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,517Mar 20, 2026Updated 2 weeks ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,106Updated this week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Defeating Windows User Account Control☆7,469Feb 17, 2026Updated last month
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,927Apr 1, 2026Updated last week
- DRAKVUF Black-box Binary Analysis☆1,218Mar 5, 2026Updated last month
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,256Mar 26, 2026Updated 2 weeks ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,257Sep 3, 2022Updated 3 years ago
- Hiding kernel-driver for x86/x64.☆2,654Sep 2, 2025Updated 7 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,118Jul 10, 2024Updated last year
- Demos of various injection techniques found in malware☆792Feb 15, 2022Updated 4 years ago
- Windows memory hacking library☆5,380Jan 26, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆742Mar 17, 2019Updated 7 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,513Nov 15, 2023Updated 2 years ago
- Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.☆1,738Nov 24, 2023Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,524Jul 8, 2025Updated 9 months ago
- Source from VMDE paper, adapted to 2015☆189Dec 18, 2017Updated 8 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,683Feb 14, 2024Updated 2 years ago
- Hook system calls, context switches, page faults and more.☆2,642May 9, 2023Updated 2 years ago
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,125Mar 8, 2026Updated last month
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆516May 14, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Converts PE into a shellcode☆2,751Aug 30, 2025Updated 7 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,334Updated this week
- AV/EDR evasion via direct system calls.☆1,807Sep 3, 2022Updated 3 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,978Feb 24, 2025Updated last year
- Diaphora, the most advanced Free and Open Source program diffing tool.☆4,227Nov 24, 2024Updated last year
- A Pin Tool for tracing API calls etc☆1,638Feb 8, 2026Updated 2 months ago
- A tool to detect and crash Cuckoo Sandbox☆297Jul 22, 2024Updated last year