Prevents Analytics for Websites and Games
-
Updated
Jun 8, 2024 - C#
Prevents Analytics for Websites and Games
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
Binary obfuscation, anti-reversing, anti-debugging and av-bypass framework for Windows
Demonstrates of eight common code obfuscation techniques
Script made in python to try to have as few detections as possible in Virustotal.
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Various .NET Anti-Debug and Anti-VM techniques
Some anti-sandbox techniques implemented in Golang.
Documentation including tools and techniques learned during development of ThirdEye.
Linux anti-debugging and anti-analysis rust library
Windows API Call Obfuscation
FileRedirector
AndrODet: An Adaptive Android Obfuscation Detector
ESET CrackMe Analysis
demo of common anti-analysis techniques used by malware
Anti-Analysis technique, trick the debugger by Hiding events from it.
Lepton is a Lightweight ELF Parsing Tool that was designed specifically for analyzing and editing binaries with damaged or corrupted ELF headers.
Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.
ProTecT is an MS-DOS packer. While this packer is outdated, it uses a number of interesting anti-analysis techniques that are still relevant today.
Add a description, image, and links to the anti-analysis topic page so that developers can more easily learn about it.
To associate your repository with the anti-analysis topic, visit your repo's landing page and select "manage topics."