A tool to detect and crash Cuckoo Sandbox
☆297Jul 22, 2024Updated last year
Alternatives and similar repositories for anticuckoo
Users that are interested in anticuckoo are comparing it to the libraries listed below
Sorting:
- Source from VMDE paper, adapted to 2015☆188Dec 18, 2017Updated 8 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆463Nov 22, 2018Updated 7 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆602Nov 7, 2020Updated 5 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆383Apr 17, 2017Updated 8 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Apr 10, 2013Updated 12 years ago
- zer0m0n driver for cuckoo sandbox☆368May 19, 2015Updated 10 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- C++ application that uses memory and code hooks to detect packers☆275Mar 5, 2018Updated 7 years ago
- A static analyzer for PE executables.☆1,107Feb 24, 2026Updated last week
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 11 years ago
- WinDBG Anti-RootKit Extension☆645Jul 29, 2020Updated 5 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,233Aug 7, 2025Updated 6 months ago
- Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that…☆3,868Jun 21, 2024Updated last year
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Modified edition of cuckoo☆406Nov 21, 2017Updated 8 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,861Feb 1, 2026Updated last month
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆127Dec 3, 2022Updated 3 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆145Jul 22, 2016Updated 9 years ago
- A CrackMe powered with a virtual machine.☆43Apr 13, 2015Updated 10 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Enumerates very, very large directories quickly by directly using kernel syscalls. For POSIX and Windows. WARNING THIS IS OBSOLETE. USE B…☆15Aug 13, 2014Updated 11 years ago