There are 8 repositories under anti-vm topic.
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
Detects virtual machines and malware analysis environments
MinegamesAntiCheat Are an Advanced C# Anti-Cheat Library which prevents debug attaching, dll-injection, etc..... and it can communicate with your server.
EQU8 User-Mode Bypass and Injector
A pintool for protecting a sandbox application of common anti-virtualmachine and anti-sandbox detection techniques
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
#seccamp 2014 CTF softsec (Reverse 400pt)
Effective cloud sandbox detection from ring 3
A trojan downloader which will download any file using a direct download link stealthily. The final size of the payload will be less than 10 mb.
Malvm is a tool to create modified Windows 10/ 7 virtual machines, where malware is not able to detect its virtual environment. Those VMs can be used to analyze malware.
This repository contains the c# code which is using latest persistence technique and multiple anti-vm, anti-sandboxes techniques. Creating persistence by using WindowsApps folder, schtasks, powershell cmdlet (Get-Variable).