pandaadir05 / re-architectLinks
Advanced reverse engineering platform combining traditional static analysis with AI-powered insights. Supports multiple decompilers (Ghidra, IDA Pro, Binary Ninja), automated function analysis, and interactive web visualization for comprehensive binary analysis workflows.
☆52Updated last month
Alternatives and similar repositories for re-architect
Users that are interested in re-architect are comparing it to the libraries listed below
Sorting:
- An x86-64 code virtualizer for VM based obfuscation☆140Updated 10 months ago
- Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries☆356Updated 5 months ago
- Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine…☆271Updated 3 weeks ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆102Updated last month
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆209Updated 3 weeks ago
- An x86-64 Code Virtualizer☆287Updated last year
- Rewrite and obfuscate code in compiled binaries☆263Updated last week
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆129Updated last year
- Detects virtual machines and malware analysis environments☆139Updated 3 years ago
- ZMQ and Messagepack Powered Remote Automation Plugin for x64dbg☆49Updated last month
- compile-time control flow obfuscation using mba☆198Updated 2 years ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆43Updated last year
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆214Updated 6 months ago
- Symbol Recovery Tool for Nuitka Binaries☆74Updated 10 months ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆93Updated last year
- A devirtualization engine for Themida.☆101Updated last year
- A fast Windows emulator + debugger for reverse engineering. Runs any executable in debug mode, disassembles with Zydis, emulates instruct…☆157Updated last month
- Hooking Windows' exception dispatcher to protect process's PML4☆205Updated 9 months ago
- ANY.RUN sandbox detection collection☆21Updated last year
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆88Updated last week
- Analyze VMProtect binaries without actually executing any user code.☆33Updated 5 months ago
- VMProtect2 Deobfuscation Tooling☆55Updated 3 weeks ago
- Titan is a VMProtect devirtualizer☆53Updated 2 years ago
- Binary rewriter for 64-bit PE files.☆87Updated last year
- A modern C++20 header-only library for advanced direct system call invocation.☆156Updated last week
- A Windows Kernel Driver Emulator base on Unicorn, Kernel Memory Dump and some of native environment☆59Updated this week
- VMProtect, VMP, Devirter, 3,5☆107Updated 2 years ago
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆56Updated 4 months ago
- ☆131Updated 5 months ago
- Themida 3.x research☆33Updated 8 months ago