Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-
Updated
Apr 1, 2026 - C++
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
A collection of Proof-of-Concept implementations of various anti-disassembly techniques for ARM32 and ARM64 architectures.
non vibe-coded, fully syscalled, C/C++ userland anti-debugging library for Windows designed to protect software from reverse-engineering, focused on stealthiness.
My scripts to deobfuscate APT32 malware
Binary obfuscation, anti-reversing, anti-debugging and av-bypass framework for Windows
Add a description, image, and links to the anti-disassembly topic page so that developers can more easily learn about it.
To associate your repository with the anti-disassembly topic, visit your repo's landing page and select "manage topics."