Nitr0-G / Denuvo-InfoLinks
There will be notes about Denuvo cracking in this repository, please note that there will be notes not only mine, but also other people's (their nicknames will also be written)
☆38Updated last year
Alternatives and similar repositories for Denuvo-Info
Users that are interested in Denuvo-Info are comparing it to the libraries listed below
Sorting:
- DENUVO v1-v2 Virtual Machine profiling tool and Electronic Arts Origin decoder☆47Updated 2 months ago
- A fast Windows emulator + debugger for reverse engineering. Runs any executable in debug mode, disassembles with Zydis, emulates instruct…☆159Updated this week
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆54Updated 6 months ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆63Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆69Updated 3 years ago
- VMProtect2 Deobfuscation Tooling☆63Updated last week
- Collaboration platform for reverse engineering tools.☆44Updated 11 months ago
- WinLicense key extraction via Intel PIN☆107Updated last year
- VMProtect, VMP, Devirter, 3,5☆107Updated 2 years ago
- 🔬 IDA plugin to find patched memory☆73Updated 3 weeks ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆46Updated 2 years ago
- C++ Program used to dump Themida and VMProtect.☆31Updated last year
- A devirtualization engine for Themida.☆101Updated last year
- Fork of Scylla with additional fixes and Python bindings.☆52Updated last year
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- ☆33Updated last year
- IDA Map File Symbol Renamer☆22Updated 7 months ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆26Updated 2 years ago
- Code proving a 25-year blind spot in all disassemblers. PoC for Intel x64/x86 “ghost instructions.”☆104Updated 3 weeks ago
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆33Updated last year
- devirtualization vmprotect☆63Updated 2 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆85Updated last year
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆117Updated last year
- Symbolic Execution based on lifting amd64 to z3☆28Updated last year
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆42Updated 3 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year
- Runtime Hyper-V Hijacking with DDMA☆64Updated 3 months ago
- Ghetto user mode emulation of Windows kernel drivers.☆149Updated last year
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆104Updated last month
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆36Updated 2 years ago