kkent030315 / detect-anyrunLinks
ANY.RUN sandbox detection collection
☆19Updated 10 months ago
Alternatives and similar repositories for detect-anyrun
Users that are interested in detect-anyrun are comparing it to the libraries listed below
Sorting:
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆53Updated 5 months ago
- windows rootkit☆60Updated last year
- Header-only C++ library for producing PE files.☆33Updated 2 years ago
- ☆21Updated 5 months ago
- Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆39Updated last month
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆42Updated 8 months ago
- A journal for $6,000 Riot Vanguard bounty.☆64Updated last year
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆43Updated 9 months ago
- Generate a PDB file given the old PDB file and an address mapping☆48Updated 4 months ago
- devirtualization vmprotect☆62Updated 2 years ago
- Load dll with undocumented functions and debug symbols☆47Updated 11 months ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆70Updated 3 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆87Updated 3 months ago
- idashare is an IDA Pro plugin that allows you to quickly share the currently loaded binary and IDA database over a local HTTP server with…☆11Updated 3 months ago
- monitors hidden syscalls called from call of duty anticheat☆82Updated 6 months ago
- A VMWare logger using built-in backdoor.☆30Updated 9 months ago
- Elevate arbitrary MSR writes to kernel execution.☆37Updated last year
- Another UEFI runtime bootkit☆29Updated 2 years ago
- ☆22Updated last year
- Small driver that uses alternative syscalls feature (the project is still under development).☆17Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆64Updated 2 years ago
- Report and exploit of CVE-2024-21305.☆36Updated last year
- This repo contains EXPs about Vulnerable Windows Driver☆46Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆55Updated 8 months ago
- Remove WPP calls from hexrays decompiled code☆50Updated 3 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆122Updated last year
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- A Windows executable (PE) packer (x64) with LZMA compression and with full TLS (Thread Local Storage) support☆67Updated 3 weeks ago
- Binary rewriter for 64-bit PE files.☆83Updated last year
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆23Updated 3 years ago