segnolin / VobfusLinks
virtualization obfuscator inspired by juhajong/vm-obfuscator
☆57Updated 6 years ago
Alternatives and similar repositories for Vobfus
Users that are interested in Vobfus are comparing it to the libraries listed below
Sorting:
- ☆21Updated 8 years ago
- LLVM pass that obfuscates against symbolic execution☆76Updated 7 years ago
- Wow64 Heaven's Gate Hook☆29Updated 4 years ago
- a code virtualizer based on angr☆32Updated 2 years ago
- VMProtect analysis script☆55Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 6 years ago
- Yet another windows syscall library☆19Updated 5 years ago
- Lightweight x86 and x64 instructions disassembler☆35Updated 7 years ago
- An API Monitor based on Instrumentation☆44Updated 8 years ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆35Updated last year
- Implementation of a LLVM Compiler Plugin for C++ Obfuscation☆43Updated 2 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year
- clone of armadillo patched for windows☆48Updated last year
- Triton based symbolic emulator☆16Updated 3 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆61Updated 5 years ago
- Windows sandbox PoC☆32Updated 5 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆61Updated 2 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆75Updated 6 years ago
- LLVM obfuscation pass, flattening at the basic block's level and turning each basic block into a dispacher and each instruction into a ne…☆49Updated 4 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- Instrumenting a binary without source code to bypass anti-debug checks☆38Updated 4 years ago
- vmp2.x devirtualization☆88Updated last year
- Analysing and defeating PatchGuard universally☆36Updated 5 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆25Updated 8 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 4 years ago
- ☆19Updated 6 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- ☆40Updated 6 years ago
- Library for using direct system calls☆36Updated 10 months ago