poppopjmp / VMDragonSlayerLinks
Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine based protectors. Combines Dynamic Taint Tracking, Symbolic Execution, Pattern & Semantic Classification, and Machine Learning–driven prioritization to dramatically reduce manual reverse engineering time.
☆320Updated 3 months ago
Alternatives and similar repositories for VMDragonSlayer
Users that are interested in VMDragonSlayer are comparing it to the libraries listed below
Sorting:
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- Binary Ninja plugin to analyze and simplify obfuscated code☆236Updated 3 months ago
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆243Updated 3 months ago
- An x86-64 Code Virtualizer☆301Updated last year
- Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries☆590Updated this week
- LLVM based static binary analysis framework☆295Updated 10 months ago
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆323Updated last year
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆234Updated 9 months ago
- compile-time control flow obfuscation using mba☆199Updated 2 years ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆137Updated last year
- A high-performance C++ framework for emulating executable binaries☆128Updated 2 months ago
- ☆160Updated last month
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆252Updated last year
- x86-64 code/pe virtualizer☆205Updated last year
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆437Updated last month
- RISC-V Virtual Machine☆277Updated 7 months ago
- An x86-64 code virtualizer for VM based obfuscation☆171Updated last year
- Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.☆292Updated last month
- Collection of hypervisor detections☆293Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆82Updated 10 months ago
- Native code virtualizer for x64 binaries☆513Updated last year
- Debugger Anti-Detection Benchmark☆381Updated 3 weeks ago
- Code proving a 25-year blind spot in all disassemblers. PoC for Intel x64/x86 “ghost instructions.”☆109Updated 3 months ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆161Updated last year
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆242Updated 3 months ago
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆100Updated last year
- binary instrumentation, analysis, and patching framework☆100Updated last week
- an IDA Pro Plugin to detect common Anti-Cheat Artifacts☆88Updated last month
- Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)☆336Updated last year
- A Qt-based CyberChef interface designed for malware analysis workflows, particularly in IDA Pro☆95Updated 3 months ago