baikaishiuc / fastvmLinks
deobfuse compiler
☆215Updated 4 years ago
Alternatives and similar repositories for fastvm
Users that are interested in fastvm are comparing it to the libraries listed below
Sorting:
- break ollvm.☆114Updated 8 months ago
- IDA plugin, unwind stack trace when debugging arm.☆139Updated 5 years ago
- 使用Binary Ninja去除ollvm流程平坦混淆☆439Updated 5 years ago
- Automatically de-obfuscate ollvm and generate binaries☆116Updated 3 years ago
- ☆89Updated 4 years ago
- deobfuscator llvm arm64 script☆96Updated 6 years ago
- PLCT实验室维护的ollvm分支。原始代码来自于 https://github.com/obfuscator-llvm/obfuscator 移植到了最新的 LLVM 上。☆168Updated 3 years ago
- A step-by-step tutorial for building an LLVM sample pass☆202Updated 3 years ago
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆232Updated 5 years ago
- IDA Python Script for anti ollvm☆107Updated 4 years ago
- ART tracing research☆91Updated 3 years ago
- ☆61Updated last year
- 逆向聚安全litevm相关☆53Updated 5 years ago
- My toy llvm pass☆138Updated 3 years ago
- Deobfuscate OLLVM Bogus Control Flow via angr☆68Updated 4 years ago
- Syscall table hook frame in Android kernel for arm and arm64☆82Updated 8 years ago
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆172Updated 3 years ago
- Official Capstone Disassembly Engine API documentation☆126Updated 4 years ago
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- Common IDA scripts for effective Reverse Enginnering☆174Updated 2 years ago
- ☆162Updated 6 years ago
- ollvm de-obfuscator☆63Updated 4 years ago
- android memory access trace utility powered by frida framework☆246Updated 3 years ago
- Some reverse-engineering scripts☆119Updated 6 years ago
- ☆60Updated 8 years ago
- 针对OLLVM的IDA分析插件☆262Updated 9 years ago
- D-810 is an IDA Pro plugin which can be used to deobfuscate code at decompilation time by modifying IDA Pro microcode.☆63Updated 4 years ago
- ☆123Updated 3 years ago
- 笔者在一款基于LLVM编译器架构的retdec开源反编译器工具的基础上,融合了klee符号执行工具,通过符号执行(Symbolic Execution)引擎动态模拟反编译后的llvm的ir(中间指令集)运行源程序的方法,插桩所有的对x86指令集的thiscall类型函数对t…☆223Updated 3 years ago
- 帮助逆向者使用ida便利地调试apk so文件,抛开调试前的那些麻烦步骤☆44Updated 3 years ago