pafish/README.md

29 lines
995 B
Markdown
Raw Normal View History

2015-01-01 19:17:06 +03:00
2021-10-04 19:13:50 +03:00
<img alt="pafish-logo" src="pafish/pafish.ico" align="left" width="64px">
2012-07-01 16:55:09 +04:00
# Pafish
2012-07-01 15:06:41 +04:00
2015-05-09 16:01:43 +03:00
Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.
2012-07-01 16:55:09 +04:00
2015-12-28 15:58:46 +03:00
The project is open source, you can read the code of all anti-analysis checks. You can also **[download](https://github.com/a0rtega/pafish/raw/master/pafish.exe)** the executable of the latest stable version.
2012-07-01 16:55:09 +04:00
2021-10-04 19:13:50 +03:00
![pafish screenshot](https://raw.githubusercontent.com/a0rtega/pafish/dev-chaos/screenshots/v057/pafish_vbox_win8.png)
2016-03-16 21:43:41 +03:00
2012-07-01 16:55:09 +04:00
# Scope
2015-01-01 19:17:06 +03:00
The objective of this project is to collect usual tricks seen in malware samples. This allows us to study them, and test if our analysis environments are properly implemented.
2012-10-28 22:11:24 +04:00
2012-07-03 21:50:37 +04:00
# Build
2015-05-09 16:01:43 +03:00
Pafish is written in C and can be built with MinGW (gcc + make).
2015-12-28 15:58:46 +03:00
Check out "[How to build](https://github.com/a0rtega/pafish/wiki/How-to-build)" for detailed instructions.
2012-07-03 21:50:37 +04:00
2012-07-01 16:55:09 +04:00
# Author
2021-09-30 21:33:33 +03:00
Alberto Ortega
2021-10-04 19:13:50 +03:00
# License
[GPL-3.0](LICENSE.txt)