Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-
Updated
Oct 6, 2024 - C++
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
A tool to detect and crash Cuckoo Sandbox
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
C# Project contains a plenty of Advanced Anti-Debugging, Anti-Virtualization, Anti Dll-Injection and Anti-Hooking Techniques.
Detects virtual machines and malware analysis environments
Detect virtual environment
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.
MinegamesAntiCheat Are an Advanced C# Anti-Cheat Library which prevents debug attaching, dll-injection, etc..... and it can communicate with your server.
A Malware Scarecrow for Windows 10/11 with a user-friendly touch.
Some anti QEMU trick used by in-the-wild malware.
A pintool for protecting a sandbox application of common anti-virtualmachine and anti-sandbox detection techniques
Binary obfuscation, anti-reversing, anti-debugging and av-bypass framework for Windows
Some anti-sandbox techniques implemented in Golang.
Apate performs anti-debugging, anti-VM and anti-sandbox tests, to see if your linux system is able to stay under the radar.
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Effective cloud sandbox detection from ring 3
#seccamp 2014 CTF softsec (Reverse 400pt)
This repository contains the c# code which is using latest persistence technique and multiple anti-vm, anti-sandboxes techniques. Creating persistence by using WindowsApps folder, schtasks, powershell cmdlet (Get-Variable).
Add a description, image, and links to the anti-sandbox topic page so that developers can more easily learn about it.
To associate your repository with the anti-sandbox topic, visit your repo's landing page and select "manage topics."