File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -4,19 +4,19 @@ This project is a Go implementation of well-known techniques trying to detect if
44
55Why doing this in Go ? Because there are many C programs already doing this, but none written in pure Go.
66
7- ## Installation
7+ ## Usage
88
99First download the package
1010```
1111$ go get github.com/ShellCode33/VM-Detection/vmdetect
1212```
1313
14- Then see ! [ main.go] ( https://github.com/ShellCode33/VM-Detection/blob/master/main.go ) to see how to use it .
14+ Then see [ main.go] ( https://github.com/ShellCode33/VM-Detection/blob/master/main.go ) to use it in your own project .
1515
1616## GNU/Linux techniques
1717
18- - Look for known strings in the DMI table (/dev/mem )
19- - Look for hints in the kernel ring buffer (/dev/kmsg)
18+ - Look for known strings in the DMI table (` /sys/class/dmi/id/* ` )
19+ - Look for hints in the kernel ring buffer (` /dev/kmsg ` )
2020- Look for virtual chassis in systemd configuration
2121
2222## Windows techniques
@@ -25,6 +25,6 @@ Coming soon...
2525
2626## Resources
2727
28- ! [ systemd-detect-virt source code] ( https://github.com/systemd/systemd/blob/master/src/basic/virt.c )
28+ [ systemd-detect-virt source code] ( https://github.com/systemd/systemd/blob/master/src/basic/virt.c )
2929
30- ! [ Malware evasion techniques] ( https://www.deepinstinct.com/2019/10/29/malware-evasion-techniques-part-2-anti-vm-blog/ )
30+ [ Malware evasion techniques] ( https://www.deepinstinct.com/2019/10/29/malware-evasion-techniques-part-2-anti-vm-blog/ )
You can’t perform that action at this time.
0 commit comments