File tree Expand file tree Collapse file tree 1 file changed +6
-6
lines changed Expand file tree Collapse file tree 1 file changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -4,19 +4,19 @@ This project is a Go implementation of well-known techniques trying to detect if
4
4
5
5
Why doing this in Go ? Because there are many C programs already doing this, but none written in pure Go.
6
6
7
- ## Installation
7
+ ## Usage
8
8
9
9
First download the package
10
10
```
11
11
$ go get github.com/ShellCode33/VM-Detection/vmdetect
12
12
```
13
13
14
- Then see ! [ main.go] ( https://github.com/ShellCode33/VM-Detection/blob/master/main.go ) to see how to use it .
14
+ Then see [ main.go] ( https://github.com/ShellCode33/VM-Detection/blob/master/main.go ) to use it in your own project .
15
15
16
16
## GNU/Linux techniques
17
17
18
- - Look for known strings in the DMI table (/dev/mem )
19
- - Look for hints in the kernel ring buffer (/dev/kmsg)
18
+ - Look for known strings in the DMI table (` /sys/class/dmi/id/* ` )
19
+ - Look for hints in the kernel ring buffer (` /dev/kmsg ` )
20
20
- Look for virtual chassis in systemd configuration
21
21
22
22
## Windows techniques
@@ -25,6 +25,6 @@ Coming soon...
25
25
26
26
## Resources
27
27
28
- ! [ systemd-detect-virt source code] ( https://github.com/systemd/systemd/blob/master/src/basic/virt.c )
28
+ [ systemd-detect-virt source code] ( https://github.com/systemd/systemd/blob/master/src/basic/virt.c )
29
29
30
- ! [ Malware evasion techniques] ( https://www.deepinstinct.com/2019/10/29/malware-evasion-techniques-part-2-anti-vm-blog/ )
30
+ [ Malware evasion techniques] ( https://www.deepinstinct.com/2019/10/29/malware-evasion-techniques-part-2-anti-vm-blog/ )
You can’t perform that action at this time.
0 commit comments