SecureWinVM

OUTDATED DUE TO DEPRICATION OF WINDOWS 10. Secure configuration that prevents apps from detecting the VM from the inside
Log | Files | Refs | README

commit ee9c93526f211706d4d039b2246edf38c4931fd6
parent e2d07864ea46e80a604c8812385fcaed2eaed215
Author: tddra <Tdd0r@proton.me>
Date:   Wed, 19 Nov 2025 22:47:01 +0100

README added

Diffstat:
MREADME.md | 33+++++++++++++++++++++++++++++++++
1 file changed, 33 insertions(+), 0 deletions(-)

diff --git a/README.md b/README.md @@ -0,0 +1,33 @@ +# SecureWinVM + +A VM hardening project designed to make a virtual machine difficult to detect by malware. + +**⚠️ WARNING: This project is completely outdated and no longer maintained.** + +## Technology Stack + +- KVM/QEMU virtualization +- Windows 10 guest OS + +## Directory Structure + +### scripts/ +Contains PowerShell scripts for registry modifications: + +- **spoof_hardware.ps1** - Main script that spoofs hardware identifiers in the Windows registry: + - BIOS version (spoofed as Lenovo 1.21) + - Disk identifier (spoofed as Samsung 500GB SATA) + - CD-ROM identifier + +- **addToAutoStart.md** - Script to add the hardware spoofing script to Windows autostart for persistence after reboot + +### xml/ +- **winSSM.xml** - VM configuration file + +## Usage + +1. Run `spoof_hardware.ps1` with administrator privileges to modify registry entries +2. Use the autostart script to ensure changes persist after system reboot + +The scripts modify registry keys that malware typically checks to detect virtualized environments. +