Bunch of techniques potentially used by malware to detect analysis environments
☆160Jul 4, 2016Updated 9 years ago
Alternatives and similar repositories for anti-analysis-tricks
Users that are interested in anti-analysis-tricks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- capstone based disassembler for extracting to binnavi☆230Jun 8, 2016Updated 9 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆462Nov 22, 2018Updated 7 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- Linux bind shell with anti-reverse engineering techniques☆292Feb 9, 2017Updated 9 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆167Sep 24, 2016Updated 9 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- Python Malware Crawler for Zoos and Repositories☆109Apr 9, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- ☆117Nov 11, 2012Updated 13 years ago
- Malware exploits☆558Aug 22, 2025Updated 7 months ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆141Apr 4, 2017Updated 8 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆296Sep 30, 2023Updated 2 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- TinyAntivirus is an open source antivirus engine designed for detecting polymorphic virus and disinfecting it.☆394Apr 18, 2017Updated 8 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Apr 8, 2022Updated 3 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Various DFIR Tools☆27Jul 23, 2018Updated 7 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- Any useful windbg plugins I've written.☆117Apr 10, 2018Updated 7 years ago
- ☆22Mar 23, 2016Updated 10 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago