mzakocs / VirtualizationObfuscatorAnalysis
A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators
☆64Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for VirtualizationObfuscatorAnalysis
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆52Updated 9 months ago
- VM devirtualization PoC based on AsmJit and llvm☆104Updated 3 years ago
- A devirtualization engine for Themida.☆91Updated 8 months ago
- Kernel ReClassEx☆63Updated last year
- ☆32Updated 9 months ago
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆39Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆62Updated last year
- Ghetto user mode emulation of Windows kernel drivers.☆122Updated last month
- devirtualization vmprotect☆61Updated last year
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆86Updated 7 months ago
- Code virtualizer☆22Updated 8 years ago
- VMProtectTest☆37Updated last year
- ☆36Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆69Updated last year
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆71Updated 5 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆87Updated last year
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- fix vmprotect import function used unicorn-engine.☆92Updated last year
- Me fockin' pe protector☆45Updated 2 years ago
- Obfuscate calls to imports by patching in stubs☆64Updated 3 years ago
- ☆93Updated 7 years ago
- VMProtect, VMP, Devirter, 3,5☆104Updated last year
- Attempts to decrypt JM Xorstr in some x64 binaries☆50Updated last year
- IDA Plugin that fills in missing indirect CALL & JMP target information☆115Updated last year
- ☆30Updated 2 years ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆32Updated last year
- Binary rewriter for 64-bit PE files.☆43Updated 9 months ago
- Symbolic Execution based on lifting amd64 to z3☆17Updated 4 months ago
- Different aproaches to detecting EPT hooks☆84Updated 2 years ago