Overview

  The VxLang Project is a code or binary obfuscation project that prevents attackers from performing reverse engineering actions such as static or dynamic analysis, file tampering, and unauthorized access to memory. It consists of a packer/protector, code obfuscation tools, and code virtualization tools. It currently targets Microsoft Windows PE executables (*.exe/*.dll/*.sys and UEFI) on x86-64, with future support for Linux ELF and ARM.

Binary Protector

  The Binary Protector modifies, compresses, and encrypts the original executable into a file format used internally. It incorporates VxLang core code, which can be reinforced and extended with additional modules. This flexible structure allows users to freely expand functionality and control the VxLang core.

Code Obfuscator



  The Code Obfuscation tool alters native code to obstruct analysis, either by breaking code blocks or flattening code to the same depth. Additional obfuscation methods will be added in the future.

Code Virtualizer


  The Code Virtualization tool transforms the code into an internal assembly language. This language is converted to bytecode and executed by an internal compiler.