header-frame

142 Techniques

64 Snippets

28 Yara Rules

8 Contributors

12 Classification

Unprotect Database

The most complete database about malware evasion techniques!

alternative

Open Source

Access to the database is free and it is community-centric.

alternative

Code Snippets

We document all techniques with a piece of code that can be used to strengthen your security.

alternative

Yara Rules

Improve your threat research and malware analysis with our Yara Rules.

FEATURES

Understand Malware Evasion Techniques

Understand how malware bypasses your in-place security and how to harden your system.

alternative

Community Centric

The database aims to provide the most detailed information on evasion techniques. Anyone can participate and will be credited on the project page.

  • Full classification
  • Description and ressource available
  • Understand quickly how works a specific technique
VISIT
alternative

Code Snippets

Understanding evasion techniques is easier when you have the source code to understand how it works.

  • Operationnal code available
  • Multiple languages supported
  • Easy to understand
VISIT
alternative

Yara Rules

Yara rules are essential for threat hunting and malware analysis. We aim to provide yara rules for each technique reported in the database.

  • Leverage your threat hunting
  • Detect evasion techniques easily
  • Improve your sandbox operation
VISIT
NEWSLETTER

Stay Updated With The Latest News

footer-frame