vxlang-page
vxlang-page copied to clipboard
protector & obfuscator & code virtualizer
VxLang
What is vxlang?
VXLANG is a project designed to prevent reverse-engineering behaviors such as static or dynamic analysis, file tampering, and unauthorized access to memory by attackers.
The vxlang project currently targets x86-64 system and .Net binaries, native binary files for the Microsoft Windows operating system, including executables with the ".exe" extension, dynamic link library files with the ".dll" extension, and kernel driver files with the ".sys" extension. (The types of target binaries supported by vxlang will be expanded in future updates).
Virtualization Preview
Before

After

Obfuscation Preview
Before
After


Precautions
-
Optimization
: Verify that VxVirtualizationBegin and VxVirtualizationEnd are in the same block.
If procedures are merged due to code optimization, problems may arise. -
switch-case
: In the switch-case, when the branch movement is not an IMM value, it may be moved to the original position. -
Exception handling
: Currently, the virtual CPU does not support exception handling.
How to get the full version
The full version of VxLang is developed and operated under donation through Patreon or BTC.
The exact usage of VxLang and sharing of extension module code, new features of VxLang, etc. will be shared.
If you have any questions, please send your request to the email below.
- E-Mail: [email protected]
- Full Version
- You can control all features of the VxLang protector.
- Support for virtual CPUs with specialized CPU contexts.
- Patreon
Usage
Latest Version
-
Download
- Demo: ver.1.3.16.0
- Full: Latest version
1.x.x
-
1.3.16.0
- Fixed bug where a crash occurred if the obfuscation section was missing when debug information was added.
-
1.3.15.0
- Fixed bugs related to adding resources
-
1.3.14.0
- Fixed bug for code-flattening&obfuscation
- Fixed packing log.
-
1.3.13.0
- Improved memory protection.
- Added additional protection to the R/W area.
- Improved process pause detection.
- Improved memory protection.
-
1.3.12.0
- Fixed a feature that conflicts with Windows 11.
-
1.3.11.0
- Improved import table settings.
- Set-up the same as a common commercial packer.
- Improved import table settings.
-
1.3.10.0
- Improved memory protection
- Fixed Anti-Tamper bug
-
1.3.9.0
- Updated obfuscation scope for packer shell code
- Updated obfuscation patterns
-
1.3.8.0
- Updated virtualization target instruction
- Updated code flattening transformations
- Fixed minor bug
-
1.3.7.0
- Fixed code-flattening bug.
- Enhanced randomization.
- Added the ability to modify some target code in obfuscation or flattening
- Added the ability to modify source code like code virtualization. I will gradually increase the target code for modulation.
- Fixed code-flattening bug.
-
1.3.6.0
- Fixed Small bug.
- Update code-obfuscation patterns.
-
1.3.5.1
- Fixed bug with kernel module obfuscation.
-
1.3.5.0
- (Beta) Adding *.map file parsing.
- In Beta, only Code-Flattening will be done.
- (Beta) Adding *.map file parsing.
TODO
-
Task
- Add ELF32/64 format for x86-64
- Add code obfuscation methods for x86-64
- Once the above steps are complete, add the ARM system for the ELF file format.
Special Thanks
Thank you to everyone who helped with the development.