☆72Jul 8, 2021Updated 4 years ago
Alternatives and similar repositories for hitb2021ams_deobfuscation
Users that are interested in hitb2021ams_deobfuscation are comparing it to the libraries listed below
Sorting:
- ☆76Sep 30, 2021Updated 4 years ago
- Personal curation of Clang/LLVM patches.☆12Feb 27, 2021Updated 5 years ago
- Workshop Material on VM-based Deobfuscation☆200Oct 20, 2021Updated 4 years ago
- MODeflattener deobfuscates control flow flattened functions obfuscated by OLLVM using Miasm.☆203Jul 23, 2021Updated 4 years ago
- Code deobfuscation framework to simplify Mixed Boolean-Arithmetic (MBA) expressions☆347Feb 2, 2026Updated last month
- Files for my solution to the SSTIC 2021 challenge☆15Jun 14, 2021Updated 4 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Control-flow-flattening and string deobfuscator☆160Nov 8, 2021Updated 4 years ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆651Mar 14, 2025Updated 11 months ago
- Efficient Deobfuscation of Linear Mixed Boolean-Arithmetic Expressions☆183Oct 12, 2023Updated 2 years ago
- Ghidra RE scripts☆38Feb 5, 2021Updated 5 years ago
- A way to detect DBI frameworks, Debuggers and VMs.☆24Nov 17, 2020Updated 5 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- IDA strike-out: A Hex-Rays decompiler plugin to patch the Ctree☆126Nov 27, 2025Updated 3 months ago
- A C++14/17 header-only Windows memory editing library with a focus on type safety and modern C++ style.☆13Jun 3, 2019Updated 6 years ago
- An IDA plugin that eases reversing of binaries that have been code-size-optimized with function outlining☆224Dec 31, 2024Updated last year
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- Analyses in IDA/Hex-Rays☆87Apr 6, 2023Updated 2 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.