segnolin / Vobfus
virtualization obfuscator inspired by juhajong/vm-obfuscator
☆57Updated 5 years ago
Alternatives and similar repositories for Vobfus:
Users that are interested in Vobfus are comparing it to the libraries listed below
- LLVM obfuscation pass, flattening at the basic block's level and turning each basic block into a dispacher and each instruction into a ne…☆46Updated 3 years ago
- ☆36Updated 2 years ago
- ☆19Updated 7 years ago
- Binary Ninja plugin for automating VMProtect analysis☆58Updated 2 years ago
- Wow64 Heaven's Gate Hook☆28Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆63Updated last year
- Code virtualizer☆23Updated 8 years ago
- a code virtualizer based on angr☆29Updated 2 years ago
- vmp2.x devirtualization☆68Updated 3 months ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- VMProtectTest☆37Updated 2 years ago
- Example of hijacking system calls via function pointer tables☆32Updated 3 years ago
- Triton based symbolic emulator☆16Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- windows kernel pagehook☆38Updated 2 years ago
- A deobfuscation plugin for IDA☆61Updated 2 years ago
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆39Updated 2 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆71Updated 5 years ago
- Yet another windows syscall library☆18Updated 4 years ago
- ollvm 4.0 using clang 10.0.1☆13Updated 3 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆74Updated 14 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆35Updated 7 months ago
- ☆34Updated 4 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆52Updated 2 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- ☆15Updated last year
- LLVM pass that obfuscates against symbolic execution☆75Updated 6 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆32Updated last year