VmwareHardenedLoader
pafish
VmwareHardenedLoader | pafish | |
---|---|---|
7 | 17 | |
1,487 | 3,087 | |
- | - | |
0.0 | 5.5 | |
over 1 year ago | over 2 years ago | |
C | C | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
VmwareHardenedLoader
-
Bypass EAC "cannot run under virtual machine" (ESXi, Windows VM)?
Tried installing this vmware hardener, including all of its config changes. Got a different error message (something like "Please unload vmloader.sys"), but still didn't work.
- How to optimize workstation pro 17 for 8 virtual PCs at once?
- Virtualization hypervisors what the heck...
- Is there something like this for proxmox?
-
ProctorU Is Dystopian Spyware
https://github.com/hzqst/VmwareHardenedLoader works for VMware but doesn't work against some modern anti-cheats, but KVM universally works against anti-cheats when configured properly with RTDSC spoofing and such
-
Looking to run a LOL bot to level up account in a VM
You will need a VM bypass, some bot discords include them separately for a one time fee like Elixrbot which I use but it locks you into VMWare/vSphere, I tried using on a QEMU platform (Proxmox) but I suspect you will need something other than the QEMU display adapters for it to work. I haven't tried them yet but there's some other resources out there like https://github.com/hzqst/VmwareHardenedLoader and https://www.youtube.com/watch?v=oHrcM1ZvH4c&feature=youtu.be
-
Making a VM look as legit as possible?
Check VmwareHardendedLoader if you are running vmware workstation.
pafish
-
Is there still a way to counter virtual machine detection by popular anti cheat?
Pafish is what you asking for, but as u/ForceBlade wrote, you cannot win this game.
-
How to play rainbow 6 siege?
You can do it however that requires extensive Research. There are Things such as https://github.com/a0rtega/pafish That Help you get the First detection vectors sorted. However hate to say it but youll be better off actually coding a "Cheat" that Patches the vm Checks the Game does in Order to Play.
-
Makes perfect sense
Yes. For example: https://github.com/a0rtega/pafish
-
I came again to bother you guys
You can check what thing are detected by using -> https://github.com/a0rtega/pafish Normally VM Exit and Virtual Input devices are detected. But it still works for 99% of the games.
-
Error on BattlEye when getting into bus
I have been working on obfuscating my vm, the results are mixed... A good start is to use paranoid fish , tools gives you an idea how it detects vm's :)
-
VMware Shared Folders
So I suppose that it depends on the malware. Some malware doesn't want to take the chance of being reverse engineered, so when it's aware that it is in a virtual machine, it might shut down. pafish has functionality for working out whether-or-not it is running in a VMware instance.
-
VFIO current status with anti cheats?
Last time when I tried to run Valorant just BSoD the VM Everything else works (EAC, BE, Ricochet, etc...). You can test if your VM can be detected using this tool.
- Virtualization hypervisors what the heck...
-
Gaming VM under nested virtualization
Does soft as pafish https://github.com/a0rtega/pafish will detect RDTSC VM exit on wraped WinVM?
-
Does Windows think I'm running on VM? Not sure where to look.
You can use pafish to test vm detection methods. https://github.com/a0rtega/pafish
What are some alternatives?
opencanary - Modular and decentralised honeypot
RDTSC-KVM-Handler - my patches for linux kernel to spoof rdtsc and make vm exit undetected
cuckoo-modified - Modified edition of cuckoo
VBoxHardenedLoader - VirtualBox VM detection mitigation loader
VMDE - Source from VMDE paper, adapted to 2015
al-khaser - Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Reverse-Engineering-Tutorial - A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
kiteshield - Packer/Protector for x86-64 ELF binaries on Linux
RATwurst - Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.
qemu-git-patched-pkgbuild - qemu-git PKGBUILD from AUR patched for anti-vm detection