samrussell / vmprotect_binja_plugin
Binary Ninja plugin for automating VMProtect analysis
☆58Updated 2 years ago
Alternatives and similar repositories for vmprotect_binja_plugin:
Users that are interested in vmprotect_binja_plugin are comparing it to the libraries listed below
- Code virtualizer☆23Updated 8 years ago
- VTIL command line utility☆27Updated 3 years ago
- ☆36Updated 2 years ago
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆58Updated 6 months ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆71Updated 5 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆22Updated last year
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆63Updated last year
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 5 months ago
- Extensions for x64dbg written in Rust: Telescope and Unicorn powered disassembly☆24Updated last year
- VMProtectTest☆37Updated last year
- devirtualization vmprotect☆62Updated last year
- Disassembler for Zeus VM custom instruction set☆27Updated last year
- ☆30Updated 3 years ago
- ☆36Updated last year
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆35Updated last year
- Lightweight PDB symbol parser and resolver☆24Updated 3 months ago
- ☆22Updated 2 weeks ago
- obfuscation that aims to not stand out☆23Updated 2 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆16Updated 3 years ago
- Symbolic Execution based on lifting amd64 to z3☆21Updated 7 months ago
- Playing with LLVM passes☆36Updated last year
- x86-64 user mode emulation using Zydis☆44Updated last month
- LLVM obfuscation pass, flattening at the basic block's level and turning each basic block into a dispacher and each instruction into a ne…☆46Updated 3 years ago
- IDA-names automatically renames pseudocode windows with the current function name.☆51Updated 2 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆56Updated last year
- ☆15Updated last year
- ☆32Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆68Updated 2 years ago
- Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No …☆15Updated 8 months ago