vxlang / vxlang-page
protector & obfuscator & code virtualizer
☆440Updated this week
Alternatives and similar repositories for vxlang-page:
Users that are interested in vxlang-page are comparing it to the libraries listed below
- Native code virtualizer for x64 binaries☆459Updated last month
- PE bin2bin obfuscator☆638Updated 6 months ago
- C++ 17 or higher control flow obfuscation library for windows binaries☆333Updated 5 months ago
- Debugger Anti-Detection Benchmark☆303Updated last year
- DLL that hooks the NtQuerySystemInformation API and hides a process name☆289Updated last year
- System call hook for Windows 10 20H1☆485Updated 3 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆256Updated 2 years ago
- Deobfuscation via optimization with usage of LLVM IR and parsing assembly.☆461Updated last week
- VMProtect 2.x-3.x x64 Import Deobfuscator☆283Updated last year
- obfuscated any constant encryption in compile time on any platform☆430Updated last year
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆434Updated 2 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆525Updated 3 weeks ago
- Compile-time, Usermode + Kernelmode, safe and lightweight string crypter library for C++11+☆724Updated 3 years ago
- X86 Mutation Engine with Portable Executable compatibility.☆479Updated 2 years ago
- Obfusheader.h is a portable header file for C++14 compile-time obfuscation.☆598Updated 5 months ago
- Anti-cheat library for Windows C++☆423Updated 2 years ago
- Anti-debugging techniques on a (bad looking) Win32 application.☆235Updated 10 months ago
- Titan is a VMProtect devirtualizer☆3Updated 10 months ago
- windows syscalls with a single line and a high level of abstraction. has modern cpp20 wrappers and utilities, range-based DLL and export …☆167Updated this week
- Inline syscalls made easy for windows on clang☆688Updated 7 months ago
- Memory hacking library powered by AMD SVM☆316Updated last year
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆414Updated 6 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆317Updated 2 years ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆274Updated last year
- An x86-64 Code Virtualizer☆176Updated 4 months ago
- Fumo Loader - All in one kernel-based DLL injector☆272Updated 3 weeks ago
- Bypassing PatchGuard on modern x64 systems☆252Updated last year
- x86 PE Mutator☆212Updated 2 years ago
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆254Updated 6 months ago
- anti debugging library in c++.☆532Updated 11 months ago