segnolin / VobfusLinks
virtualization obfuscator inspired by juhajong/vm-obfuscator
☆57Updated 6 years ago
Alternatives and similar repositories for Vobfus
Users that are interested in Vobfus are comparing it to the libraries listed below
Sorting:
- ☆21Updated 8 years ago
- LLVM pass that obfuscates against symbolic execution☆76Updated 7 years ago
- Wow64 Heaven's Gate Hook☆29Updated 4 years ago
- Yet another windows syscall library☆18Updated 5 years ago
- a code virtualizer based on angr☆32Updated 3 years ago
- ☆19Updated 6 years ago
- An API Monitor based on Instrumentation☆44Updated 8 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆37Updated last year
- ☆40Updated 6 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year
- VMProtect analysis script☆55Updated 5 years ago
- 大表哥的Syscall-Monitor☆34Updated 6 years ago
- ☆36Updated 3 years ago
- Triton based symbolic emulator☆16Updated 3 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆40Updated 6 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 6 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆61Updated 5 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 4 years ago
- LLVM obfuscation pass, flattening at the basic block's level and turning each basic block into a dispacher and each instruction into a ne…☆49Updated 4 years ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆35Updated last year
- Implementation of a LLVM Compiler Plugin for C++ Obfuscation☆43Updated 2 years ago
- Library for using direct system calls☆36Updated 11 months ago
- clone of armadillo patched for windows☆48Updated last year
- Standalone program to download PDB Symbol files for debugging without WDK☆79Updated 6 years ago
- vmp2.x devirtualization☆89Updated last year
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆25Updated 9 years ago
- Lightweight x86 and x64 instructions disassembler☆35Updated 7 years ago
- Windows sandbox PoC☆32Updated 5 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆61Updated 2 years ago