All Projects → strazzere → Anti Emulator

strazzere / Anti Emulator

Licence: apache-2.0
Android Anti-Emulator

Programming Languages

java
68154 projects - #9 most used programming language

Projects that are alternatives of or similar to Anti Emulator

Simplify
Android virtual machine and deobfuscator
Stars: ✭ 3,865 (+558.43%)
Mutual labels:  emulator, malware, reverse-engineering
Simpleator
Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that were added in Windows 10 Spring Update (1803), also called "Redstone 4", with additional improvements that were made in Windows 10 October Update (1809), aka "Redstone 5".
Stars: ✭ 260 (-55.71%)
Mutual labels:  emulator, malware, reverse-engineering
Qiling
Qiling Advanced Binary Emulation Framework
Stars: ✭ 2,816 (+379.73%)
Mutual labels:  emulator, malware, reverse-engineering
Infectpe
InfectPE - Inject custom code into PE file [This project is not maintained anymore]
Stars: ✭ 266 (-54.68%)
Mutual labels:  malware, reverse-engineering
Miasm
Reverse engineering framework in Python
Stars: ✭ 2,649 (+351.28%)
Mutual labels:  emulator, reverse-engineering
decrypticon
Java-layer Android Malware Simplifier
Stars: ✭ 17 (-97.1%)
Mutual labels:  emulator, malware
Medusa
An open source interactive disassembler
Stars: ✭ 946 (+61.16%)
Mutual labels:  emulator, reverse-engineering
Zelos
A comprehensive binary emulation and instrumentation platform.
Stars: ✭ 298 (-49.23%)
Mutual labels:  emulator, malware
Freki
🐺 Malware analysis platform
Stars: ✭ 285 (-51.45%)
Mutual labels:  malware, reverse-engineering
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+881.77%)
Mutual labels:  malware, reverse-engineering
Drakvuf Sandbox
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
Stars: ✭ 384 (-34.58%)
Mutual labels:  malware, reverse-engineering
Dex Oracle
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Stars: ✭ 398 (-32.2%)
Mutual labels:  malware, reverse-engineering
Cmulator
Cmulator is ( x86 - x64 ) Scriptable Reverse Engineering Sandbox Emulator for shellcode and PE binaries . Based on Unicorn & Zydis Engine & javascript
Stars: ✭ 197 (-66.44%)
Mutual labels:  emulator, reverse-engineering
Unicorn
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, X86)
Stars: ✭ 4,934 (+740.55%)
Mutual labels:  emulator, reverse-engineering
Bap
Binary Analysis Platform
Stars: ✭ 1,385 (+135.95%)
Mutual labels:  emulator, reverse-engineering
Nt wrapper
A wrapper library around native windows sytem APIs
Stars: ✭ 287 (-51.11%)
Mutual labels:  malware, reverse-engineering
Pafish
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
Stars: ✭ 2,026 (+245.14%)
Mutual labels:  malware, reverse-engineering
Antidebugging
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-72.57%)
Mutual labels:  malware, reverse-engineering
Pwndbg
Exploit Development and Reverse Engineering with GDB Made Easy
Stars: ✭ 4,178 (+611.75%)
Mutual labels:  malware, reverse-engineering
Domain generation algorithms
Some results of my DGA reversing efforts
Stars: ✭ 417 (-28.96%)
Mutual labels:  malware, reverse-engineering

anti-emulator

Android Anti-Emulator, originally presented at HitCon 2013: "Dex Education 201: Anti-Emulation"

Purpose of this project was intended to show various ways of detecting an emulated Android environment. Some of the methods are adapted from previously seen malware on other operating systems, others are just random thoughts. Slowly over time things have been added that I've either thought of randomly, stumbled upon or came across in the wild. I'll do my best to comment if anything from the wild is added directly to the project, as this would likely be more interesting to AV/researchers attempting to hide their own sandboxes.

Contents

  • slides/ - Talk slides
  • AntiEmulation/ - Eclipse project and main source of anti* code

Disclaimer

This presentation and code are meant for education and research purposes only. Do as you please with it, but accept any and all responsibility for your actions. The tools were created specifically to assist in malware reversing and analysis - be careful.

License

Copyright 2014-19 Tim 'diff' Strazzere <[email protected]>

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

   http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].