Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine based protectors. Combines Dynamic Taint Tracking, Symbolic Execution, Pattern & Semantic Classification, and Machine Learning–driven prioritization to dramatically reduce manual reverse engineering time.
☆392Feb 22, 2026Updated last month
Alternatives and similar repositories for VMDragonSlayer
Users that are interested in VMDragonSlayer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LLVM based static binary analysis framework☆305Apr 2, 2025Updated last year
- Native code virtualizer for x64 binaries☆523Dec 20, 2024Updated last year
- Deobfuscation via optimization with usage of LLVM IR and parsing assembly.☆812Apr 9, 2026Updated last week
- Comprehensive Windows Syscall Extraction & Analysis Framework☆166Aug 30, 2025Updated 7 months ago
- Standalone static version of Triton's x86/x64 translator☆32Mar 28, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆342Jul 29, 2024Updated last year
- Titan is a VMProtect devirtualizer☆126Mar 6, 2024Updated 2 years ago
- Rewrite and obfuscate code in compiled binaries☆276Dec 13, 2025Updated 4 months ago
- An x86-64 Code Virtualizer☆315Sep 26, 2024Updated last year
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- binary instrumentation, analysis, and patching framework☆104Feb 20, 2026Updated 2 months ago
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆257Nov 4, 2025Updated 5 months ago
- WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API☆656Jan 23, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This repository offers an open-source C++ SDK bindings for IDA, enabling custom plugin development and automation.☆350Mar 27, 2026Updated 3 weeks ago
- Rust library for lifting raw binary data to LLVM IR☆61Jul 18, 2025Updated 9 months ago
- A Windows Kernel Driver Emulator base on Unicorn, Kernel Memory Dump and some of native environment☆176Jan 15, 2026Updated 3 months ago
- protector & obfuscator & code virtualizer☆712Apr 12, 2026Updated last week
- IDA Pro plugin AntiXorstr☆156Feb 24, 2025Updated last year
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆381Jun 3, 2023Updated 2 years ago
- x86-64 user mode emulation using Zydis☆74Mar 15, 2026Updated last month
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆1,808Updated this week
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆74Apr 13, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆63Feb 7, 2024Updated 2 years ago
- Port of zentool to Windows☆27Mar 7, 2025Updated last year
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆124Dec 8, 2024Updated last year
- PE (and elf now!) bin2bin obfuscator☆836Oct 11, 2025Updated 6 months ago
- ☆430Jan 1, 2025Updated last year
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆279Nov 20, 2022Updated 3 years ago
- an ida plugin used to decompile vmp☆383Jul 2, 2024Updated last year
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆259Apr 16, 2025Updated last year
- Windows hypervisor for Intel x64: defensive host hypervisor for Windows designed to mitigate kernel-level attacks including BYOVD, compat…☆256Mar 15, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆72Mar 24, 2026Updated 3 weeks ago
- Exemplary LLVM function pass implementing Control Flow Flattening.☆17May 2, 2018Updated 7 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Sep 16, 2025Updated 7 months ago
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆107Mar 15, 2021Updated 5 years ago
- Efficient general mixed boolean-arithmetic (MBA) simplifier☆128Updated this week
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆41Mar 3, 2026Updated last month
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆27May 7, 2025Updated 11 months ago