poppopjmp / VMDragonSlayerLinks
Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine based protectors. Combines Dynamic Taint Tracking, Symbolic Execution, Pattern & Semantic Classification, and Machine Learning–driven prioritization to dramatically reduce manual reverse engineering time.
☆236Updated last month
Alternatives and similar repositories for VMDragonSlayer
Users that are interested in VMDragonSlayer are comparing it to the libraries listed below
Sorting:
- Rewrite and obfuscate code in compiled binaries☆256Updated 3 weeks ago
- Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries☆348Updated 4 months ago
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆228Updated last week
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆128Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆156Updated last year
- Windows 11 24H2 Runtime PatchGuard Bypass☆190Updated 3 weeks ago
- compile-time control flow obfuscation using mba☆194Updated 2 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆81Updated 6 months ago
- An x86-64 Code Virtualizer☆284Updated last year
- ☆153Updated 2 months ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆166Updated 3 months ago
- A collection of Proof-of-Concept implementations of various anti-disassembly techniques for ARM32 and ARM64 architectures.☆73Updated 5 months ago
- LLVM based static binary analysis framework☆260Updated 6 months ago
- Makes IDA (most versions) to crash upon opening it.☆101Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆93Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆96Updated 4 months ago
- RISC-V Virtual Machine☆252Updated 3 months ago
- ☆89Updated 7 months ago
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆302Updated last year
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆402Updated last week
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25Updated 4 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆76Updated last month
- dynamic binary instrumentation, analysis, and patching framework☆94Updated 2 weeks ago
- An x86-64 code virtualizer for VM based obfuscation☆138Updated 9 months ago
- Hooking Windows' exception dispatcher to protect process's PML4☆198Updated 8 months ago
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆233Updated 11 months ago
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆203Updated 5 months ago
- Reimplementation of Microsoft's Warbird obuscator☆143Updated last year
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆51Updated this week
- ☆94Updated last year