wekillpeople / anti-vm
anti-virtualmachine with C!
☆23Updated 8 years ago
Alternatives and similar repositories for anti-vm:
Users that are interested in anti-vm are comparing it to the libraries listed below
- Bypass antivirus with dynamic import. Hide the api(s) used.☆26Updated 8 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆12Updated 9 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- windows create process with a dll load first time via LdrHook☆30Updated 8 years ago
- Simple code generation library developed in C intended for code generation in Kernel mode☆16Updated 2 years ago
- Windows kernel-mode callbacks tutorial driver☆47Updated 8 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆56Updated 5 years ago
- Anti-AV compilation☆42Updated 11 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Simple standalone bundle of NT core APIs☆26Updated 9 years ago
- A command line tool to load and unload a device driver.☆47Updated 7 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆82Updated 14 years ago
- Decrement Windows Kernel for fun and profit☆38Updated 7 years ago
- Anti-Anti-VM solution via Windows Driver☆57Updated 6 years ago
- find and kill injectedThreads from memory☆10Updated 9 years ago
- Bootkits Revisited☆41Updated 10 years ago
- Protect process fsfilter driver. Windows x64☆34Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆77Updated 9 years ago
- ☆51Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆34Updated 8 years ago
- Class implementation of PowerLoader injection technique☆29Updated 8 years ago
- Windows anti-rootkit library☆38Updated 10 years ago
- ☆80Updated 7 years ago
- Examples for detection of hidden processes on windows☆33Updated 10 years ago
- OpenSrc projects; common multiprojects headers store to ./Common/*category*/☆48Updated 11 years ago
- ☆32Updated 6 years ago
- User-mode hook bypassing method☆33Updated 8 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- Wow64 syscall hook☆40Updated 7 years ago
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆48Updated 10 years ago