Difference between revisions of "Unprotect Project2"

From Unprotect Project
Jump to: navigation, search
(The Unprotect Matrix)
Line 13: Line 13:
=The Unprotect Matrix=
=The Unprotect Matrix=

Revision as of 23:10, 18 October 2016


Welcome on The Unprotect Project
Most of the malware in the wild use protection to avoid analysis and detection. We often find obfuscation technics but also the use of packer/crypter, anti-debug, anti-disassembly or anti-sandbox, anti-honeypot, anti-dump, Anti-monitor, etc… Lot of technic are use by malware coder to defeat the analyst and the tools that allow the detection.

It is important to highlight this technics because they are also used by legitimate program to avoid reverse engineering and analysis and to protect intellectual property.

The objective of this wiki is to centralise every technics to understand and detect new generation of malware.

The Unprotect Matrix

File:Example.jpg File:UnproTech-Map.png

Getting started