sunwm518 / VMProtect-3-5-DEvirt
VMProtect, VMP, Devirter, 3,5
☆106Updated 2 years ago
Alternatives and similar repositories for VMProtect-3-5-DEvirt:
Users that are interested in VMProtect-3-5-DEvirt are comparing it to the libraries listed below
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆58Updated last year
- A devirtualization engine for Themida.☆100Updated last year
- VMP Mutation API Fix☆41Updated 3 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆133Updated 5 months ago
- A Dynamic Study Vmprotect 1.x-1.9X Unpacking Toolkit, Recovery OEP, FIX PE, IAT and bypass protection with custom Loader and interceptor …☆31Updated last year
- VM devirtualization PoC based on AsmJit and llvm☆113Updated 3 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- fix vmprotect import function used unicorn-engine.☆92Updated 2 years ago
- Kernel ReClassEx☆61Updated last year
- A simple ida python script to find .data ptr☆50Updated last year
- C++ library for parsing and manipulating PE files statically and dynamically.☆86Updated last year
- Cross-Platform Framework for High-Speed Memory Pattern Scanning with Multithreading, SIMD Support, and Alternative STL ETL Integration☆37Updated 2 months ago
- PE-Dump-Fixer☆105Updated 5 years ago
- Dump .net assembly from a native loader which uses ClrCreateinstance☆55Updated 2 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆95Updated 2 years ago
- Titan is a VMProtect devirtualizer☆48Updated last year
- Attempts to decrypt JM Xorstr in some x64 binaries☆53Updated 2 years ago
- Obfuscate calls to imports by patching in stubs☆67Updated 3 years ago
- Simple IDA Pro plugin to download Unity debug symbols from their symbol server☆61Updated last year
- Various IDA scripts I've created for Reverse engineering.☆84Updated 5 months ago
- vmp .net devirtualizer☆49Updated last year
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆51Updated 3 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆123Updated 2 years ago
- 🪝 Different aproaches to detecting EPT hooks☆104Updated 2 years ago
- A lightweight BattlEye emulator of the launcher☆61Updated 2 years ago
- WinLicense key extraction via Intel PIN☆101Updated last year
- Windows PDB parser for kernel-mode environment.☆95Updated 2 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆75Updated last year
- just proof of concept. hooking MmCopyMemory PG safe.☆67Updated last year
- devirtualization vmprotect☆62Updated 2 years ago