CLR Anti-Debugger/Profiler Code Logo

CLR Anti-Debugger/Profiler Code

0
Free
Visit Website

This code utilizes undocumented features of Microsoft's CLR to prevent managed debuggers/profilers from working. It may not be effective in future CLR versions and could potentially lead to unexpected behaviors. Tested on various versions of CLR including 2.0, 3.5, 4.0, and 4.5. Includes test executables for different CLR versions and architectures. Users can experiment with attaching managed debuggers/profilers like Visual Studio's .NET debugger and CLR Profiler.

FEATURES

ALTERNATIVES

A Python library for automating time-based blind SQL injection attacks

Microservice for scanning files with Yara

Malware sandbox for executing malicious files in an isolated environment with advanced features.

A framework for creating XNU based rootkits for OS X and iOS security research

A tool for searching a Git repository for interesting content

YARA is a tool for identifying and classifying malware samples based on textual or binary patterns.

Tool for decompressing malware samples to run Yara rules against them.

A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.

PINNED