ayoubfaouzi / al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
☆6,096Updated last month
Alternatives and similar repositories for al-khaser:
Users that are interested in al-khaser are comparing it to the libraries listed below
- Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that…☆3,535Updated 8 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,225Updated last week
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆2,833Updated 2 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,412Updated this week
- Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide☆3,565Updated 8 months ago
- Windows memory hacking library☆4,949Updated last year
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,574Updated last month
- IDA Pro utilities from FLARE team☆2,276Updated 3 months ago
- Hook system calls, context switches, page faults and more.☆2,491Updated last year
- Vmware Hardened VM detection mitigation loader (anti anti-vm)☆1,873Updated 2 years ago
- MemProcFS☆3,376Updated this week
- Hiding kernel-driver for x86/x64.☆2,184Updated 3 weeks ago
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆1,871Updated 2 years ago
- A list of IDA Plugins☆3,629Updated 8 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,851Updated last month
- windows kernel security development☆1,979Updated 2 years ago
- Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)☆2,251Updated this week
- Diaphora, the most advanced Free and Open Source program diffing tool.☆3,740Updated 2 months ago
- A static devirtualizer for VMProtect x64 3.x. powered by VTIL.☆1,982Updated 3 years ago
- Defeating Windows User Account Control☆6,576Updated last week
- Kernel Driver Utility☆2,047Updated 3 months ago
- Converts PE into a shellcode☆2,451Updated last year
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,340Updated 8 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,106Updated last week
- Reverse engineering framework in Python☆3,565Updated 3 weeks ago
- x64 binary obfuscator☆1,764Updated last year
- State-of-the-art native debugging tools☆3,088Updated this week
- The pattern matching swiss knife☆8,542Updated last week
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,207Updated last year
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,578Updated 3 years ago