This code utilizes undocumented features of Microsoft's CLR to prevent managed debuggers/profilers from working. It may not be effective in future CLR versions and could potentially lead to unexpected behaviors. Tested on various versions of CLR including 2.0, 3.5, 4.0, and 4.5. Includes test executables for different CLR versions and architectures. Users can experiment with attaching managed debuggers/profilers like Visual Studio's .NET debugger and CLR Profiler.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
A program to manage yara ruleset in a database with support for different databases and configuration options.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
A sandbox for quickly sandboxing known or unknown families of Android Malware
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.