ENNAENNA

al-khaser

GPL-2.0

🧬 Reverse Engineering · C++

al-khaser is a proof-of-concept application that implements numerous malware evasion techniques in a single codebase. It serves as a reference for security researchers studying how malware detects virtual machines, sandboxes, debuggers, and analysis environments. Techniques include timing attacks, CPU feature detection, registry checks, process enumeration, hardware fingerprinting, and API hooking detection. Each technique is implemented, documented, and testable independently. Security teams use al-khaser to validate that their analysis environments and sandboxes are resistant to common evasion methods employed by real-world malware.

6.9kstars
1.3kforks
41issues
Updated 26d ago
+I use this

Installation

$ git clone https://github.com/LordNoteworthy/al-khaser.git

Use Cases

  • Testing sandbox and VM detection resistance
  • Studying malware evasion techniques
  • Validating analysis environment stealth
  • Reference implementation for anti-analysis research

Tags

anti-analysisevasionvm-detectionsandbox-detectionanti-debuggingmalware-researchanti-disassemblyanti-emulationanti-sandboxanti-vmav-bypasscode-injectionmalwaresandbox-evasiontiming-attacks

Community Reviews

More in Reverse Engineering