Skip to content

Latest commit

 

History

History
58 lines (39 loc) · 1.82 KB

README.md

File metadata and controls

58 lines (39 loc) · 1.82 KB
banner
  • A fork of modern version of Code Virtualizer SDK for Go
  • All right are reserved by Oreans.com

Introduction

Code Virtualizer is a powerful code obfuscation system for Windows applications that helps developers to protect their sensitive code areas against Reverse Engineering with very strong obfuscation code, based on code virtualization.

Code Virtualizer will convert your original code (Intel x86/x64 instructions) into Virtual Opcodes that will only be understood by an internal Virtual Machine. Those Virtual Opcodes and the Virtual Machine itself are unique for every protected application, avoiding a general attack over Code Virtualizer.

Code Virtualizer can protect your sensitive code areas in any x86 and x64 native PE/ELF/Mach-O files (like executable files/EXEs, system services, DLLs , OCXs , ActiveX controls, shared objects, screen savers and device drivers).

banner

Example

package main

import (
	"fmt"
	"github.com/orange-cpp/virtualizersdk-redux/v2"
)

var stealth_area = [virtualizersdk.STEALTH_ONE_MB * 6]uint32{
	virtualizersdk.STEALTH_ARRAY_FLAG1,
	virtualizersdk.STEALTH_ARRAY_FLAG2,
	virtualizersdk.STEALTH_ARRAY_FLAG3,
	virtualizersdk.STEALTH_ARRAY_FLAG4,
	virtualizersdk.STEALTH_ARRAY_FLAG5,
	virtualizersdk.STEALTH_ARRAY_FLAG6,
	virtualizersdk.STEALTH_ARRAY_FLAG7,
	virtualizersdk.STEALTH_ARRAY_FLAG8}

func main() {
	virtualizersdk.Macro(virtualizersdk.SHARK_BLACK_START)


    // Force compiler to NOT delete array 
    // if it unused.
	if stealth_area[0] == 0x11111 {
		fmt.Println(stealth_area[0])
	}

	fmt.Println("Hello World!")

	virtualizersdk.Macro(virtualizersdk.SHARK_BLACK_END)
}