{"id":23421575,"url":"https://github.com/evilbytecode/pydefender","last_synced_at":"2025-04-12T14:06:31.898Z","repository":{"id":246596080,"uuid":"821560761","full_name":"EvilBytecode/PyDefender","owner":"EvilBytecode","description":"Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.","archived":false,"fork":false,"pushed_at":"2025-03-22T15:27:41.000Z","size":323,"stargazers_count":48,"open_issues_count":0,"forks_count":6,"subscribers_count":4,"default_branch":"main","last_synced_at":"2025-03-22T16:29:59.269Z","etag":null,"topics":["anti-sandbox","anti-virtualization","anti-virtualmachine","anti-vm","antidebug","antidebugging","protect","protection","python"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"unlicense","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/EvilBytecode.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-06-28T20:34:12.000Z","updated_at":"2025-03-22T15:27:44.000Z","dependencies_parsed_at":"2024-06-28T23:38:35.422Z","dependency_job_id":"91d6da73-4f3f-4a0d-8ca6-4bd67a5173eb","html_url":"https://github.com/EvilBytecode/PyDefender","commit_stats":null,"previous_names":["evilbytecode/pydefender"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FPyDefender","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FPyDefender/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FPyDefender/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FPyDefender/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/EvilBytecode","download_url":"https://codeload.github.com/EvilBytecode/PyDefender/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248578864,"owners_count":21127713,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["anti-sandbox","anti-virtualization","anti-virtualmachine","anti-vm","antidebug","antidebugging","protect","protection","python"],"created_at":"2024-12-23T02:16:04.875Z","updated_at":"2025-04-12T14:06:31.893Z","avatar_url":"https://github.com/EvilBytecode.png","language":"Python","readme":"# PyDefender\n- This Python code provides functionality to detect and defend against various forms of debugging tools and virtualization environments.\n\n![PyDefender](PyDefender.png)\n\n### Anti-Virtualization\n\n- **Triage Detection**: Detects if the system is running in a triage or analysis environment.\n- **Monitor Metrics**: Monitors system metrics to identify abnormal behavior indicative of virtualization.\n- **VirtualBox Detection**: Detects the presence of Oracle VirtualBox.\n- **VMware Detection**: Detects the presence of VMware virtualization software.\n- **KVM Check**: Checks for Kernel-based Virtual Machine (KVM) hypervisor.\n- **Username Check**: Verifies if the current user is a default virtualization user.\n- **Recent User Activity**: Checks user activity; if there are fewer than 20 files, it exits.\n- **USB Mount**: Checks if a USB was ever plugged into the computer before.\n- **QEMU Detection**: Identifies the presence of QEMU virtualization.\n- **Parallels Check**: Detects the use of Parallels virtualization software.\n- **VM Artifacts**: Searches for common artifacts indicating a virtual machine environment.\n\n### Anti-Debug\n\n- **IsDebuggerPresent**: Checks if a debugger is currently attached to the process.\n- **Remote Debugger**: Detects if a remote debugger is connected to the process.\n- **PC Uptime**: Monitors system uptime to detect debugging attempts based on system restarts.\n- **Check Blacklisted Windows Names**: Verifies if the process name matches any blacklisted names commonly used by debuggers.\n- **Running Processes**: Retrieves a list of running processes and identifies potential malicious ones.\n- **Parent Anti-Debug**: Detects if the parent process is attempting to debug the current process.\n- **Kill Bad Processes**: Terminates known malicious processes detected on the system.\n- **Internet Connection Check**: Checks if an internet connection is present.\n\n### Process\n- **Critical Process**: Sets Process as critical\n\n### Quick Nutshell\n- PyDefender provides comprehensive anti-virtualization and anti-debugging measures to enhance program security by detecting and countering various forms of virtualization and debugging activities.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fevilbytecode%2Fpydefender","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fevilbytecode%2Fpydefender","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fevilbytecode%2Fpydefender/lists"}