mirror of
https://github.com/a0rtega/pafish
synced 2024-11-28 17:03:16 +03:00
27 lines
1.0 KiB
Markdown
27 lines
1.0 KiB
Markdown
|
|
# Pafish
|
|
## (Paranoid Fish)
|
|
|
|
Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.
|
|
|
|
The project is open source, you can read the code of all anti-analysis checks. You can also **[download](https://github.com/a0rtega/pafish/raw/master/pafish.exe)** the executable of the latest stable version.
|
|
|
|
It is licensed under GNU/GPL version 3.
|
|
|
|
![Pafish screenshot](https://raw.githubusercontent.com/a0rtega/pafish/dev-chaos/screenshots/v057/pafish_vbox_win8.png)
|
|
|
|
# Scope
|
|
|
|
The objective of this project is to collect usual tricks seen in malware samples. This allows us to study them, and test if our analysis environments are properly implemented.
|
|
|
|
# Build
|
|
|
|
Pafish is written in C and can be built with MinGW (gcc + make).
|
|
|
|
Check out "[How to build](https://github.com/a0rtega/pafish/wiki/How-to-build)" for detailed instructions.
|
|
|
|
# Author
|
|
|
|
Alberto Ortega (@[a0rtega](https://twitter.com/#!/a0rtega) - [profile](http://aortega.badtrace.com))
|
|
|