segnolin / VobfusLinks
virtualization obfuscator inspired by juhajong/vm-obfuscator
☆57Updated 5 years ago
Alternatives and similar repositories for Vobfus
Users that are interested in Vobfus are comparing it to the libraries listed below
Sorting:
- ☆21Updated 8 years ago
- a code virtualizer based on angr☆30Updated 2 years ago
- LLVM pass that obfuscates against symbolic execution☆75Updated 7 years ago
- Wow64 Heaven's Gate Hook☆28Updated 4 years ago
- Yet another windows syscall library☆18Updated 5 years ago
- ☆36Updated 3 years ago
- vmp2.x devirtualization☆83Updated 11 months ago
- A deobfuscation plugin for IDA☆64Updated 3 years ago
- An API Monitor based on Instrumentation☆44Updated 7 years ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆34Updated last year
- Triton based symbolic emulator☆16Updated 2 years ago
- LLVM obfuscation pass, flattening at the basic block's level and turning each basic block into a dispacher and each instruction into a ne…☆47Updated 4 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Updated 2 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- VMProtect analysis script☆55Updated 5 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆75Updated 5 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆36Updated last year
- ☆19Updated 6 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 5 years ago
- 大表哥的Syscall-Monitor☆34Updated 6 years ago
- Binary Ninja plugin for automating VMProtect analysis☆62Updated 2 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- ☆18Updated 6 years ago
- IDA strike-out: A Hex-Rays decompiler plugin to patch the Ctree☆119Updated last year
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- obfacros - a set of C++ macros that can be used to obfuscate your c/c++ code, to make executables harder for reverse-engineering.☆46Updated 6 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Updated 8 years ago
- clone of armadillo patched for windows☆47Updated 11 months ago