kkent030315 / detect-anyrunLinks
ANY.RUN sandbox detection collection
☆21Updated last year
Alternatives and similar repositories for detect-anyrun
Users that are interested in detect-anyrun are comparing it to the libraries listed below
Sorting:
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- A journal for $6,000 Riot Vanguard bounty.☆65Updated last year
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆44Updated 11 months ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆72Updated last month
- Generate a PDB file given the old PDB file and an address mapping☆49Updated last month
- Windows 11 24H2 Runtime PatchGuard Bypass☆182Updated this week
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆72Updated 5 months ago
- LLVM based obfuscation engine☆100Updated 2 months ago
- Report and exploit of CVE-2024-21305.☆38Updated last year
- A VMWare logger using built-in backdoor.☆30Updated 11 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆127Updated last year
- ☆23Updated last month
- kASLR bypass technique on Intel CPUs.☆29Updated 3 months ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆43Updated 10 months ago
- dynamic binary instrumentation, analysis, and patching framework☆94Updated 2 weeks ago
- Header-only C++ library for producing PE files.☆34Updated 2 years ago
- windows rootkit☆61Updated last year
- devirtualization vmprotect☆62Updated 2 years ago
- monitors hidden syscalls called from call of duty anticheat☆84Updated 8 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆89Updated 5 months ago
- Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆90Updated last week
- An x86-64 code virtualizer for VM based obfuscation☆133Updated 8 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆129Updated 2 weeks ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆59Updated 10 months ago
- This repo contains EXPs about Vulnerable Windows Driver☆46Updated last year
- spoof return address☆77Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆71Updated 2 years ago
- Compileable POC of namazso's x64 return address spoofer.☆50Updated 5 years ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆89Updated 2 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆68Updated 5 months ago