Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
☆3,898Jun 21, 2024Updated last year
Alternatives and similar repositories for pafish
Users that are interested in pafish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,962Apr 1, 2026Updated last month
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆4,025Updated this week
- Script to create templates to use with VirtualBox to make vm detection harder☆771Nov 5, 2022Updated 3 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,657May 3, 2026Updated 2 weeks ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆296Jun 27, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Vmware Hardened VM detection mitigation loader (anti anti-vm)☆2,271Dec 2, 2022Updated 3 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆462Nov 22, 2018Updated 7 years ago
- Windows kernel and user mode emulation.☆1,955Apr 8, 2026Updated last month
- VirtualBox VM detection mitigation loader☆970Apr 2, 2023Updated 3 years ago
- A static analyzer for PE executables.☆1,125Mar 11, 2026Updated 2 months ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,679Apr 28, 2026Updated 3 weeks ago
- Defund the Police.☆13,769Jun 7, 2024Updated last year
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,125Apr 2, 2026Updated last month
- Defeating Windows User Account Control☆7,576Feb 17, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The FLARE team's open-source tool to identify capabilities in executable files.☆6,002May 12, 2026Updated last week
- DRAKVUF Black-box Binary Analysis☆1,232Mar 5, 2026Updated 2 months ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,267Mar 26, 2026Updated last month
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,278Sep 3, 2022Updated 3 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,120Jul 10, 2024Updated last year
- Hiding kernel-driver for x86/x64.☆2,713Sep 2, 2025Updated 8 months ago
- Demos of various injection techniques found in malware☆790Feb 15, 2022Updated 4 years ago
- Windows memory hacking library☆5,415Jan 26, 2024Updated 2 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆742Mar 17, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,526Nov 15, 2023Updated 2 years ago
- Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.☆1,747Nov 24, 2023Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,590Jul 8, 2025Updated 10 months ago
- Source from VMDE paper, adapted to 2015☆189Dec 18, 2017Updated 8 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,684Feb 14, 2024Updated 2 years ago
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,167May 11, 2026Updated last week
- Hook system calls, context switches, page faults and more.☆2,649May 9, 2023Updated 3 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆515May 14, 2024Updated 2 years ago
- Converts PE into a shellcode☆2,763Aug 30, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,352Apr 18, 2026Updated last month
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,290May 11, 2026Updated last week
- AV/EDR evasion via direct system calls.☆1,811Sep 3, 2022Updated 3 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆3,002Feb 24, 2025Updated last year
- A tool to detect and crash Cuckoo Sandbox☆297Jul 22, 2024Updated last year
- A Pin Tool for tracing API calls etc☆1,652Feb 8, 2026Updated 3 months ago
- Diaphora, the most advanced Free and Open Source program diffing tool.☆4,258Updated this week