al-khaser
VBoxHardenedLoader
al-khaser | VBoxHardenedLoader | |
---|---|---|
5 | 14 | |
5,527 | 868 | |
- | - | |
5.7 | 2.3 | |
about 1 month ago | about 1 year ago | |
C++ | C | |
GNU General Public License v3.0 only | BSD 2-clause "Simplified" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
al-khaser
- My neat little internal CS:GO cheat project for Linux
- Virtualization hypervisors what the heck...
-
[Paid] Seeking RE Help.
Have you tried the normal VM modifications to make the VM undetectable? Like changing the CPUID identifier and all the other stuff? Also, check this resource, maybe you find something that looks familiar: https://github.com/LordNoteworthy/al-khaser . Here you can check if your VM is “authentic” enough. Hope that helps! Good luck!
-
Security research homelab, made with <3
To avoid detection of something like a cuckoo I would use https://github.com/nsmfoo/antivmdetection and test it with https://github.com/therealdreg/anticuckoo and https://github.com/LordNoteworthy/al-khaser
-
VM Detection Tricks, Part 2: Driver Thread Fingerprinting
Check out al-khaser on GitHub for a tool that implements dozens of VM detection tricks.
VBoxHardenedLoader
- Virtualization hypervisors what the heck...
-
Problems with VBOXHardenedLoader
I downloaded VBOXHardenedLoader and set up my VM, but there is no such file called VBOXLDR that exists that it wants me to use https://github.com/hfiref0x/VBoxHardenedLoader/blob/master/Binary/howto.md the instructions seem nonsensical and none of the commands that they want me to input are valid. I don't understand what I did wrong, I completed the previous steps perfectly.
-
Help make VMware undetected
Edit: This is what I used to accomplish this in virtualbox - https://github.com/hfiref0x/VBoxHardenedLoader
- PSA ProctorU still does not detect virtual machines.
- Which Virtual Machine do you guys use?
- How to not get flagged using CoMaS?
- ILPT Request: How do I cheat on an online proctored end sem examination?
- Very Very Vulnerable.
-
The guest addition iso effect doesn't take place.
https://github.com/hfiref0x/VBoxHardenedLoader/blob/master/Binary/howto.md#warning-virtualbox-additions
-
ULPT request: Help me bypass ‘Respondus Lockdown’ invasive and potentially destructive app
i actually figured a way around this last year, because i thought i was going to have to take a test on it. Basically, you have to install a virtual machine on your computer. however, since it normally wont run in a VM, you have to run some program some guy made to trick the software. I was able to get it working pretty easily even though in the end. I no longer remember ht esteps, and this was the only link i could find to the resources i used, but if you are determined you should be able to find the youtube videos I used fairly easily.
What are some alternatives?
inside-vm - Detect if code is running inside a virtual machine (x86 and x86-64 only).
virtualbox-org-svn-vbox-trunk - *UNOFFICIAL* mirror of the repository at http://www.virtualbox.org/svn/vbox/trunk (the first 30569 commits are courtesy of https://gitorious.org/virtualbox/mainlinemirror); Please **DO NOT** open pull requests against this repo
antivmdetection - Script to create templates to use with VirtualBox to make vm detection harder
VmwareHardenedLoader - Vmware Hardened VM detection mitigation loader (anti anti-vm)
EdgeDeflector - A tiny helper application to force Windows 10 to use your preferred web browser instead of ignoring the setting to promote Microsoft Edge. Only runs for a microsecond when needed.
UBoat - HTTP Botnet
scrcpy - Display and control your Android device
pafish - Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
FFmpeg - Mirror of https://git.ffmpeg.org/ffmpeg.git
Orca - Orca is an Advanced Malware with multifeatures written in C/C++ , work on all windows versions !
softgpu - SW and HW accelerated GPU driver for Windows 9x Virtual Machines