Reverse-Engineering-Tutorial
pafish
Our great sponsors
Reverse-Engineering-Tutorial | pafish | |
---|---|---|
17 | 17 | |
10,025 | 2,996 | |
- | - | |
8.6 | 5.5 | |
8 days ago | over 2 years ago | |
Assembly | C | |
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Reverse-Engineering-Tutorial
- New embedded and Rust hacking tutorials added - For anyone that missed my last post. Kevin Thomas is my mentor. We are both working together to bring free and low cost resources to those who are looking to learn and don't have money for expensive bootcamps/certs. Please enjoy his free tutorials!
- Step-By-Step Reverse Engineering Tutorial for beginners trying to get into Cybersecurity covering x86, x64, ARM32 and ARM64 and more
- Updated FREE Complete Reverse Engineering Tutorial to include C, C++ and Go
- Where is the best place to learn BINARY EXPLOITATION!?
- Updated Reverse Engineering Tutorial w/ Hacking Windows API step-by-step, under construction
-
Hacking-Windows: A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment. (UNDER DEVELOPMENT)
Thank you so kindly! Yes it is if someone is lost I would suggest the larger course here to get greater background https://github.com/mytechnotalent/Reverse-Engineering.
- Welcome to the Reverse Engineer Developer & Hacker EMPIRE!
- A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
- mytechnotalent/Reverse-Engineering - A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures
pafish
-
Is there still a way to counter virtual machine detection by popular anti cheat?
Pafish is what you asking for, but as u/ForceBlade wrote, you cannot win this game.
-
How to play rainbow 6 siege?
You can do it however that requires extensive Research. There are Things such as https://github.com/a0rtega/pafish That Help you get the First detection vectors sorted. However hate to say it but youll be better off actually coding a "Cheat" that Patches the vm Checks the Game does in Order to Play.
-
Makes perfect sense
Yes. For example: https://github.com/a0rtega/pafish
-
I came again to bother you guys
You can check what thing are detected by using -> https://github.com/a0rtega/pafish Normally VM Exit and Virtual Input devices are detected. But it still works for 99% of the games.
-
Error on BattlEye when getting into bus
I have been working on obfuscating my vm, the results are mixed... A good start is to use paranoid fish , tools gives you an idea how it detects vm's :)
-
VMware Shared Folders
So I suppose that it depends on the malware. Some malware doesn't want to take the chance of being reverse engineered, so when it's aware that it is in a virtual machine, it might shut down. pafish has functionality for working out whether-or-not it is running in a VMware instance.
-
VFIO current status with anti cheats?
Last time when I tried to run Valorant just BSoD the VM Everything else works (EAC, BE, Ricochet, etc...). You can test if your VM can be detected using this tool.
- Virtualization hypervisors what the heck...
-
Gaming VM under nested virtualization
Does soft as pafish https://github.com/a0rtega/pafish will detect RDTSC VM exit on wraped WinVM?
-
Does Windows think I'm running on VM? Not sure where to look.
You can use pafish to test vm detection methods. https://github.com/a0rtega/pafish
What are some alternatives?
Unicorn Engine - Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
VmwareHardenedLoader - Vmware Hardened VM detection mitigation loader (anti anti-vm)
Il2CppInspector - Powerful automated tool for reverse engineering Unity IL2CPP binaries
RDTSC-KVM-Handler - my patches for linux kernel to spoof rdtsc and make vm exit undetected
fasmg - flat assembler g - adaptable assembly engine
opencanary - Modular and decentralised honeypot
arm64-examples - Arm64 / C examples
VMDE - Source from VMDE paper, adapted to 2015
x86-bare-metal-examples - Dozens of minimal operating systems to learn x86 system programming. Tested on Ubuntu 17.10 host in QEMU 2.10 and real hardware. Userland cheat at: https://github.com/cirosantilli/linux-kernel-module-cheat#userland-assembly ARM baremetal setup at: https://github.com/cirosantilli/linux-kernel-module-cheat#baremetal-setup 学习x86系统编程的数十个最小操作系统。 已在QEMU 2.10中的Ubuntu 17.10主机和真实硬件上进行了测试。 Userland作弊网址:https://github.com/cirosantilli/linux-kernel-module-cheat#userland-assembly ARM裸机安装程序位于:https://github.com/cirosantilli/linux-kernel-module-cheat#baremetal- 设置 21世纪新政宣言(2020年4月5曰笫四次修改稿)(2020年6月19曰第七次修改,以下“【】”内文字为非正文内容的说明)20世纪苏联的消亡和东欧的大变革,使这21世纪初的现中国大陆成为世界关注的最主要焦点和影响新世纪文明发展的关键。特别是大陆这些年对外意识形态渗透,震撼整个世界。美中贸易战实际已打响人类意识形态领域最后的冷战,海峡两岸关系恶化,香港不断的百万人游行,南海邻国关系紧张。大陆经济急速下滑衰退,内外矛盾激化高端深感前所未有的生存危机。包括中共上下在内的几乎所有人都很清楚,大陆已到非政治体制改革而不可的时候了,大变革将是民意世潮下的必然结局。中国大陆内外即全球正合力促成这人口第一大国的大变革,这也为中国开创新政提供了一次最佳机会。综合各政体和各国现实,绝大多数国家改革选择了西方民主政体,但其固有的越来越明显的缺陷已成为有人攻击、拒绝或怀疑的理由。这也是近年来西方国家出现了宽容那必将灭亡的独裁专制政府的左翼当选,是不少选民失去信心的表现和原因。不仅如此,西方现民主制的
cuckoo-modified - Modified edition of cuckoo
XJoy - Use Nintendo Switch JoyCons as a virtual Xbox 360 controller in Windows
kiteshield - Packer/Protector for x86-64 ELF binaries on Linux