ergrelet / themida-unmutateLinks
Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.
☆306Updated last year
Alternatives and similar repositories for themida-unmutate
Users that are interested in themida-unmutate are comparing it to the libraries listed below
Sorting:
- Debugger Anti-Detection Benchmark☆368Updated 2 months ago
- Themida 3.x unpacking, unwrapping and devirtualization(future)☆179Updated 2 years ago
- Native code virtualizer for x64 binaries☆502Updated 10 months ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆387Updated 3 months ago
- VMProtect 2.x-3.x x64 Import Deobfuscator☆364Updated this week
- Deobfuscation via optimization with usage of LLVM IR and parsing assembly.☆693Updated 3 weeks ago
- Universal x86/x64 VMProtect 2.0-3.X Import fixer☆13Updated 3 years ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆300Updated 2 years ago
- My reversing tools. Some custom, some not.☆208Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆156Updated last year
- An x86-64 Code Virtualizer☆285Updated last year
- LLVM based static binary analysis framework☆257Updated 6 months ago
- A collection of themes based on pastel colors, created for reverse engineers☆152Updated 6 months ago
- IDA Pro plugin to make bitfield accesses easier to grep☆246Updated 2 months ago
- IDA Pro plugin which improves work with HexRays decompiler and helps in process of reconstruction structures and classes☆161Updated 2 months ago
- VMUnprotect.Dumper can dynamically untamper VMProtected Assembly.☆421Updated 3 years ago
- Analyze patches in a process☆257Updated 4 years ago
- compile-time control flow obfuscation using mba☆194Updated 2 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆153Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆236Updated 11 months ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆620Updated 8 months ago
- memory introspection and reverse engineering hypervisor powered by leveraging Hyper-V☆352Updated this week
- Browse Page Tables on Windows (Page Table Viewer)☆216Updated 3 years ago
- 🧪 Hypervisor with EPT hooking support.☆267Updated 3 weeks ago
- Ghetto user mode emulation of Windows kernel drivers.☆149Updated last year
- Guided Hacking's official tool to practice bypassing anti-debug techniques.☆286Updated 5 months ago
- x64dbg plugin for running python3 script. Focus on doing malware analyst and unpacking☆61Updated 7 months ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆274Updated 2 years ago
- ☆415Updated 9 months ago
- The best theme for x64dbg!☆89Updated 3 years ago