Skip to content

Commit c3a5f73

Browse files
authored
Update README.md
1 parent 6e660a3 commit c3a5f73

File tree

1 file changed

+19
-1
lines changed

1 file changed

+19
-1
lines changed

README.md

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,10 @@ A .NET Project which Contains some useful techniques to detect debugging and oth
1313

1414
* IsDebuggerPresent
1515

16+
* PEB.BeingDebugged
17+
18+
* PEB.NtGlobalFlag
19+
1620
* NtSetDebugFilterState
1721

1822
* Page Guard Breakpoints Detection
@@ -75,12 +79,24 @@ A .NET Project which Contains some useful techniques to detect debugging and oth
7579

7680
* Checking for devices created by VMs or Sandboxes
7781

82+
* Checking if AVX x64/x86 instructions are properly implemented to see if we are in an emulator.
83+
84+
* Checking for RDRAND x64/x86 instruction to see if it's properly implemented which could indicate an emulator.
85+
86+
* Checking for flags manipulation (for x64 and x86) checks to see if it's correctly handled.
87+
7888
## Anti Dll Injection
7989

8090
* Taking Advantage of Binary Image Signature Mitigation Policy to prevent injecting Non-Microsoft Binaries.
8191

8292
* Checking if any injected libraries are present (simple dlls path whitelist check)
8393

94+
* Thread Injection Detection
95+
96+
* Using PEB to change the main module info of the program which is main module name and module base address at runtime.
97+
98+
* Detecting process hollowing in our program by checking suspicious image base address.
99+
84100
## Other Detections
85101
* Detecting if Unsigned Drivers are Allowed to Load
86102

@@ -99,7 +115,9 @@ A .NET Project which Contains some useful techniques to detect debugging and oth
99115
## Hooks Detection
100116
* Detecting Most Anti Anti-Debugging Hooking Methods on Common Anti-Debugging Functions by checking for Bad Instructions on Functions Addresses and it detects user-mode anti anti-debuggers like scyllahide, and it can also detect some sandboxes which uses hooking to monitor application behaviour/activity (like <a href="https://github.com/sandboxie-plus/Sandboxie">Sandboxie/Sandboxie Plus</a>, <a href="https://www.hybrid-analysis.com">Hybrid Analysis</a>, <a href="https://cuckoosandbox.org/index.html">Cuckoo Sandbox</a>, and a lot of other online malware analysis websites/applications).
101117

118+
* Basic detection for stealthy page guard hooking.
119+
102120
* Detecting CLR Functions Hooking (like harmony hooks).
103121

104122
# Notice
105-
This Project are created for educational purposes only, also this project are licensed under MIT License.
123+
This Project are created for educational purposes only, also this project are licensed under MIT License. you can use the code however you please, just please use it responsibly (NOT for malware) (e.g. you are developing an anti-cheat).

0 commit comments

Comments
 (0)