Skip to content

vxlang/vxlang-page

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

VxLang



What is vxlang?

VXLANG is a project designed to prevent reverse-engineering behaviors such as static or dynamic analysis, file tampering, and unauthorized access to memory by attackers.

The vxlang project currently targets x86-64 system and .Net binaries, native binary files for the Microsoft Windows operating system, including executables with the ".exe" extension, dynamic link library files with the ".dll" extension, and kernel driver files with the ".sys" extension. (The types of target binaries supported by vxlang will be expanded in future updates).

Virtualization Preview

Before

After

Obfuscation Preview

Before

After

Precautions

  • Optimization : Verify that VxVirtualizationBegin and VxVirtualizationEnd are in the same block.
    If procedures are merged due to code optimization, problems may arise.
  • switch-case : In the switch-case, when the branch movement is not an IMM value, it may be moved to the original position.
  • Exception handling : Currently, the virtual CPU does not support exception handling.

How to get the full version

The full version of VxLang is developed and operated under donation through Patreon or BTC.
The exact usage of VxLang and sharing of extension module code, new features of VxLang, etc. will be shared.
If you have any questions, please send your request to the email below.

  • E-Mail: 0x999h@gmail.com
  • Full Version
    • You can control all features of the VxLang protector.
    • Support for virtual CPUs with specialized CPU contexts.
  • Patreon
  • BTC: 39hHrRoaXbDavUmAxyPvZ1aD92cVMFYGAK

Usage

Latest Version

  • Download
    • Demo: ver.1.3.12.0
    • Full: Latest version

1.x.x

  • 1.3.12.0
    • Fixed a feature that conflicts with Windows 11.
  • 1.3.11.0
    • Improved import table settings.
      • Set-up the same as a common commercial packer.
  • 1.3.10.0
    • Improved memory protection
    • Fixed Anti-Tamper bug
  • 1.3.9.0
    • Updated obfuscation scope for packer shell code
    • Updated obfuscation patterns
  • 1.3.8.0
    • Updated virtualization target instruction
    • Updated code flattening transformations
    • Fixed minor bug
  • 1.3.7.0
    • Fixed code-flattening bug.
      • Enhanced randomization.
    • Added the ability to modify some target code in obfuscation or flattening
      • Added the ability to modify source code like code virtualization. I will gradually increase the target code for modulation.
  • 1.3.6.0
    • Fixed Small bug.
    • Update code-obfuscation patterns.
  • 1.3.5.1
    • Fixed bug with kernel module obfuscation.
  • 1.3.5.0
    • (Beta) Adding *.map file parsing.
      • In Beta, only Code-Flattening will be done.
  • 1.3.4.0
    • Integration of axion mode with anti-tamper features.
    • Remove unnecessary features.
  • 1.3.3.0
    • Improved SDK search speed.
  • 1.3.2.1
    • Fixed PE parsing bug.
    • Resize unnecessary data.
  • 1.3.2.0
    • Added .NET Packing Mode.
    • Fixed PE parsing bug.
    • Task list
      • Anti-tamper and axion features will be merged.
      • Working on adding virtual code.
      • Code flattening stack allocation will change randomly.

TODO

  • Task
    • Add ELF32/64 format for x86-64
    • Add code obfuscation methods for x86-64
      • Once the above steps are complete, add the ARM system for the ELF file format.

Special Thanks

Thank you to everyone who helped with the development.