Go to file
Alberto Ortega 2a62166a5f Update README 2021-11-09 17:05:34 +01:00
.github Create FUNDING.yml 2021-10-02 12:05:18 +02:00
pafish Add memory PE image traces output 2021-11-08 20:45:19 +01:00
screenshots Add v06 screenshot 2021-11-08 21:01:32 +01:00
.gitignore Ignore .res 2021-11-08 14:01:26 +01:00
CHANGELOG Bump v058 2016-08-27 13:42:56 +02:00
LICENSE.txt Added LICENSE.txt 2013-03-23 18:03:28 +01:00
README.md Update README 2021-11-09 17:05:34 +01:00
Vagrantfile Automatically build pafish during Vagrant initialization 2019-02-16 14:23:31 +00:00

README.md

pafish-logo

Pafish

Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do.

The project is free and open source; the code of all the anti-analysis techniques is publicly available. Pafish executables for Windows (x86 32-bit and 64-bit) can be downloaded from the releases page.

pafish screenshot

Scope

The goal of this project is to collect techniques commonly observed in malware samples to evade analysis systems. This allows analysts to study them and test whether the analysis environments are properly implemented.

Building Pafish

Pafish is written in C and can be built with Mingw-w64 and make.

The wiki page "How to build" contains detailed instructions.

Author

Alberto Ortega and many awesome contributors.

License

GPL-3.0