Go to file
Alberto Ortega ad8b3dc701 Add v06 screenshot 2021-11-08 21:01:32 +01:00
.github Create FUNDING.yml 2021-10-02 12:05:18 +02:00
pafish Add memory PE image traces output 2021-11-08 20:45:19 +01:00
screenshots Add v06 screenshot 2021-11-08 21:01:32 +01:00
.gitignore Ignore .res 2021-11-08 14:01:26 +01:00
CHANGELOG Bump v058 2016-08-27 13:42:56 +02:00
LICENSE.txt Added LICENSE.txt 2013-03-23 18:03:28 +01:00
README.md Update README.md 2021-10-04 18:13:50 +02:00
Vagrantfile Automatically build pafish during Vagrant initialization 2019-02-16 14:23:31 +00:00

README.md

pafish-logo

Pafish

Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.

The project is open source, you can read the code of all anti-analysis checks. You can also download the executable of the latest stable version.

pafish screenshot

Scope

The objective of this project is to collect usual tricks seen in malware samples. This allows us to study them, and test if our analysis environments are properly implemented.

Build

Pafish is written in C and can be built with MinGW (gcc + make).

Check out "How to build" for detailed instructions.

Author

Alberto Ortega

License

GPL-3.0