lallousx86 / VmDetectLinks
Detect if running in a VM or on real hardware
☆14Updated 11 years ago
Alternatives and similar repositories for VmDetect
Users that are interested in VmDetect are comparing it to the libraries listed below
Sorting:
- Simple PE packer with RtlCompressBuffer☆21Updated 10 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Updated 9 years ago
- Contains some tricks to detect Sandboxes and gradually completed☆44Updated 8 years ago
- PoC for detecting and dumping process hollowing code injection☆52Updated 7 years ago
- Stealth DLL injector☆90Updated last year
- PoC executable packer using resources☆31Updated 9 years ago
- Bootkit for Windows 7☆27Updated 11 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Updated 7 years ago
- Kernel mode windows NT API logger☆22Updated 6 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 12 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- ☆46Updated 7 years ago
- Gozi-MBR-rootkit Bootkit Modified☆69Updated 9 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Updated 7 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- Class implementation of PowerLoader injection technique☆32Updated 9 years ago
- Provides the ability to patch/hook functions imported by a dll or executable☆35Updated 15 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Updated 8 years ago
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆48Updated 11 years ago
- Protects deletion of files with a specified extension using a kernel-mode driver.☆76Updated 7 years ago
- Common Malware Techniques☆13Updated 2 years ago
- A session-0 capable dll injection utility☆76Updated 7 years ago
- [C#]Main.exe < - > [C_DLL] < - > [C_KERNEL] = Memory_Editor via Kernel☆33Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 6 years ago
- windows create process with a dll load first time via LdrHook☆31Updated 9 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆65Updated 13 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆53Updated 7 years ago