VXLANG is a project designed to prevent reverse-engineering behaviors such as static or dynamic analysis, file tampering, and unauthorized access to memory by attackers.
The vxlang project currently targets x86-64 system and .Net binaries, native binary files for the Microsoft Windows operating system, including executables with the ".exe" extension, dynamic link library files with the ".dll" extension, and kernel driver files with the ".sys" extension. (The types of target binaries supported by vxlang will be expanded in future updates).
- Added beta code for the
ELF
file format.- The beta version only supports general
code-flattening
. - Beta features require users to specify target code.
- VxLang recommends using the
-fno-pic
option in ELF 32bit binary builds.
- The beta version only supports general
Optimization
: Verify that VxVirtualizationBegin and VxVirtualizationEnd are in the same block.
If procedures are merged due to code optimization, problems may arise.switch-case
: In the switch-case, when the branch movement is not an IMM value, it may be moved to the original position.Exception handling
: Currently, the virtual CPU does not support exception handling.
The full version of VxLang is developed and operated under donation through Patreon.
The exact usage of VxLang and sharing of extension module code, new features of VxLang, etc. will be shared.
If you have any questions, please send your request to the email below.
- E-Mail: 0x999h@gmail.com
- Full Version
- You can control all features of the VxLang protector.
- Support for virtual CPUs with specialized CPU contexts.
- Patreon
- Download
- Demo: ver.1.7.4.0
- Full: Latest version
- Update & News
Task
- Add Windows Static-Librarys.
- Add code obfuscation methods for x86-64.
- Once the above steps are complete, add the ARM system for the ELF file format.
Thank you to everyone who helped with the development.