s3team / gdopLinks
A Generalized Dynamic Opaque Predicate Obfuscator
☆45Updated 9 years ago
Alternatives and similar repositories for gdop
Users that are interested in gdop are comparing it to the libraries listed below
Sorting:
- This repo contains the tests and results that were done during the research of SATURN☆43Updated 5 years ago
- ☆69Updated last year
- Build your emulation environment as needed☆66Updated 4 years ago
- PoC for a taint based attack on VMProtect☆123Updated 6 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Updated 6 years ago
- ☆72Updated 4 years ago
- Obfuscator based on logic-bombs☆68Updated 5 years ago
- ☆76Updated 4 years ago
- Symbolic Simplification with PAttern Matching☆108Updated 8 years ago
- Alternative API for IDA / Hex-Rays☆75Updated 2 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆73Updated 6 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆49Updated 5 years ago
- Non-linear Mixed Boolean-Arithmetic Expressions☆71Updated last year
- ☆93Updated 5 years ago
- Small programs and scripts that do not require their own repositories☆139Updated 3 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆70Updated 4 years ago
- Control-flow-flattening and string deobfuscator☆160Updated 4 years ago
- Hexrays decompiler plugin that colorizes and filters the decompiler's output based on regular expressions☆141Updated 2 years ago
- Collection of various llvm passes☆130Updated 10 years ago
- ☆27Updated 7 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆38Updated 5 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Updated 7 years ago
- Collects extended function properties from IDA Pro databases☆94Updated 5 years ago
- transpile llil to c++ for execution and testing☆48Updated 2 years ago
- ☆25Updated 8 months ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 4 years ago
- ☆45Updated 4 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- The toolchain of Chosen-instruction attack☆21Updated 3 years ago
- IDA script for vmprotect Windows Api address decoder☆54Updated 4 years ago