PeterHackz / zyroxLinks
LLVM based, compile-time obfuscator plugin.
☆67Updated last week
Alternatives and similar repositories for zyrox
Users that are interested in zyrox are comparing it to the libraries listed below
Sorting:
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆109Updated last year
- llvm powered deobfuscation of a vm-based protection☆45Updated 8 months ago
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆105Updated 4 years ago
- Native opaque predicate cleaner plugin for Binary Ninja☆44Updated this week
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆88Updated 8 months ago
- dynamic binary instrumentation, analysis, and patching framework☆100Updated last week
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆39Updated last year
- VMProtect2 Deobfuscation Tooling☆75Updated last month
- An x86-64 code virtualizer for VM based obfuscation☆157Updated last year
- A collection of LLVM passes for obfuscating☆42Updated 2 years ago
- Implementation of sllvm obfuscator☆66Updated 3 years ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆114Updated 2 months ago
- LLVM based obfuscation engine☆108Updated 6 months ago
- Injecting into SELinux-protected system service processes under root on Android.☆50Updated last year
- 无痕hook探测☆43Updated 5 months ago
- compile-time control flow obfuscation using mba☆199Updated 2 years ago
- ☆19Updated last year
- Kernel mode to user mode so injection☆91Updated 5 years ago
- A Windows Kernel Driver Emulator base on Unicorn, Kernel Memory Dump and some of native environment☆154Updated last week
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆64Updated last year
- VMProtectTest☆40Updated 2 years ago
- IDA Pro plugin AntiXorstr☆150Updated 10 months ago
- Simplification of General Mixed Boolean-Arithmetic Expressions: GAMBA☆186Updated 2 years ago
- Inlay hints for hex-rays☆77Updated 8 months ago
- Code proving a 25-year blind spot in all disassemblers. PoC for Intel x64/x86 “ghost instructions.”☆110Updated 2 months ago
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆61Updated 6 months ago
- Automatic vtable detection, inheritance analysis, and function override tracking for reverse engineering compiled C++ binaries. Supports …☆92Updated 2 weeks ago
- A devirtualization engine for Themida.☆103Updated last year
- LLVM based "VM" obfuscator☆150Updated 4 years ago
- ☆20Updated 2 weeks ago