Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide
Hypervisor based anti anti debug plugin for x64dbg
A bunch of Windows anti-debugging tricks for x86 and x64.
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
UltimateAnticheat is an open source usermode anti-cheat system made to detect and prevent common attack vectors in game cheating (C++, Windows)
How to write a CrackMe for a CTF competition. Source code, technical explanation, anti-debugging and anti reverse-engineering tricks.
An advanced and low-level c++ x64 Windows usermode debugging detector, able to bypass any usermode debugger-hide tool
This project demonstrating multiple protection and anti-analysis techniques, including self-modifying code.
Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique
Some anti QEMU trick used by in-the-wild malware.
manipulates your files process information to prevent debuggers from attaching
Edit the program's TLS callbacks at runtime
Use of in-memory string scans to outsmart reverse engineers
A free and open source protector for x86_64 Windows PEs.