Go to file
Alberto Ortega 6264d96ca2 Function to read HV vendor information, added to logging 2016-03-02 20:27:03 +01:00
pafish Function to read HV vendor information, added to logging 2016-03-02 20:27:03 +01:00
screenshots Bump v052 2015-05-10 18:46:32 +02:00
.gitignore house-keeping 2015-01-01 17:17:06 +01:00
CHANGELOG Bump v056 2015-12-28 16:26:18 +01:00
LICENSE.txt Added LICENSE.txt 2013-03-23 18:03:28 +01:00
README.md Update README 2015-12-28 13:58:46 +01:00
pafish.exe Bump v056 2015-12-28 16:26:18 +01:00

README.md

Pafish

(Paranoid Fish)

Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.

The project is open source, you can read the code of all anti-analysis checks. You can also download the executable of the latest stable version.

It is licensed under GNU/GPL version 3.

Scope

The objective of this project is to collect usual tricks seen in malware samples. This allows us to study them, and test if our analysis environments are properly implemented.

Build

Pafish is written in C and can be built with MinGW (gcc + make).

Check out "How to build" for detailed instructions.

Author

Alberto Ortega (@a0rtega - profile)