al-khaser
UBoat
al-khaser | UBoat | |
---|---|---|
5 | 2 | |
5,527 | 846 | |
- | 1.4% | |
5.7 | 0.0 | |
about 1 month ago | over 3 years ago | |
C++ | C++ | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
al-khaser
- My neat little internal CS:GO cheat project for Linux
- Virtualization hypervisors what the heck...
-
[Paid] Seeking RE Help.
Have you tried the normal VM modifications to make the VM undetectable? Like changing the CPUID identifier and all the other stuff? Also, check this resource, maybe you find something that looks familiar: https://github.com/LordNoteworthy/al-khaser . Here you can check if your VM is “authentic” enough. Hope that helps! Good luck!
-
Security research homelab, made with <3
To avoid detection of something like a cuckoo I would use https://github.com/nsmfoo/antivmdetection and test it with https://github.com/therealdreg/anticuckoo and https://github.com/LordNoteworthy/al-khaser
-
VM Detection Tricks, Part 2: Driver Thread Fingerprinting
Check out al-khaser on GitHub for a tool that implements dozens of VM detection tricks.
UBoat
-
Own mini “botnet” project
https://github.com/UBoat-Botnet/UBoat take a look at this
- UBoat-Botnet/UBoat - HTTP Botnet
What are some alternatives?
inside-vm - Detect if code is running inside a virtual machine (x86 and x86-64 only).
lazy_importer - library for importing functions from dlls in a hidden, reverse engineer unfriendly way
antivmdetection - Script to create templates to use with VirtualBox to make vm detection harder
ghost - :ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
VmwareHardenedLoader - Vmware Hardened VM detection mitigation loader (anti anti-vm)
MicroBackdoor - Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]
pafish - Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
Orca - Orca is an Advanced Malware with multifeatures written in C/C++ , work on all windows versions !
ddoor - DDoor - cross platform backdoor using dns txt records
Tripwire - Tripwire monitors ports and icmp to send the admin a message if somebody is scanning a machine that shouldn't be touched
cowrie - Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io