segnolin / Vobfus
virtualization obfuscator inspired by juhajong/vm-obfuscator
☆57Updated 5 years ago
Alternatives and similar repositories for Vobfus:
Users that are interested in Vobfus are comparing it to the libraries listed below
- ☆19Updated 8 years ago
- LLVM obfuscation pass, flattening at the basic block's level and turning each basic block into a dispacher and each instruction into a ne…☆46Updated 3 years ago
- ☆36Updated 2 years ago
- vmp2.x devirtualization☆73Updated 6 months ago
- a code virtualizer based on angr☆29Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆64Updated last year
- Wow64 Heaven's Gate Hook☆28Updated 3 years ago
- Binary Ninja plugin for automating VMProtect analysis☆60Updated 2 years ago
- VMProtectTest☆35Updated 2 years ago
- IDA strike-out: A Hex-Rays decompiler plugin to patch the Ctree☆116Updated 8 months ago
- Code virtualizer☆23Updated 8 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆72Updated 5 years ago
- VMProtect analysis script☆54Updated 5 years ago
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆39Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆31Updated last year
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- IDA Pro plugin to enhance the 'g' keyboard shortcut☆43Updated last year
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- devirtualization vmprotect☆62Updated 2 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆72Updated last year
- fix vmprotect import function used unicorn-engine.☆92Updated 2 years ago
- A deobfuscation plugin for IDA☆63Updated 2 years ago
- Windows sandbox PoC☆31Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- llvm powered deobfuscation of a vm-based protection☆35Updated 3 weeks ago
- LLVM pass that obfuscates against symbolic execution☆75Updated 6 years ago