-
al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
Have you tried the normal VM modifications to make the VM undetectable? Like changing the CPUID identifier and all the other stuff? Also, check this resource, maybe you find something that looks familiar: https://github.com/LordNoteworthy/al-khaser . Here you can check if your VM is “authentic” enough. Hope that helps! Good luck!
NOTE:
The number of mentions on this list indicates mentions on common posts plus user suggested alternatives.
Hence, a higher number means a more popular project.