CLR Anti-Debugger/Profiler Code Logo

CLR Anti-Debugger/Profiler Code

0
Free
Visit Website

This code utilizes undocumented features of Microsoft's CLR to prevent managed debuggers/profilers from working. It may not be effective in future CLR versions and could potentially lead to unexpected behaviors. Tested on various versions of CLR including 2.0, 3.5, 4.0, and 4.5. Includes test executables for different CLR versions and architectures. Users can experiment with attaching managed debuggers/profilers like Visual Studio's .NET debugger and CLR Profiler.

FEATURES

ALTERNATIVES

Automate the process of writing YARA rules based on executable code within malware.

Interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features

A simple Python script to test for a hypothetical JWT vulnerability

A wordlist to bruteforce for Local File Inclusion (LFI) vulnerabilities

Command line tool for testing CRLF injection on a list of domains.

YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.

Binwalk is a tool for analyzing, reverse engineering, and extracting firmware images with security and Python 2.7 deprecation notices.

Copy executables with execute, but no read permission on Unix systems.