{"id":31254,"date":"2023-11-14T07:18:27","date_gmt":"2023-11-14T07:18:27","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=31254"},"modified":"2023-11-14T07:18:30","modified_gmt":"2023-11-14T07:18:30","slug":"novmp","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/novmp\/","title":{"rendered":"NoVmp &#8211; Unlocking VMProtect x64 With VTIL-Powered Devirtualization"},"content":{"rendered":"\n<p>Welcome to the world of NoVmp, a groundbreaking project that aims to unravel the complexities of VMProtect x64 3.0 &#8211; 3.5. <\/p>\n\n\n\n<p>In this article, we&#8217;ll dive into the intriguing realm of devirtualization, exploring how NoVmp utilizes VTIL (Virtual-machine Translation Intermediate Language) to breathe new life into protected binaries. <\/p>\n\n\n\n<p>Get ready to unlock the secrets of VMProtect and discover the power of NoVmp.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-vmprotect-nope\"><a href=\"https:\/\/github.com\/can1357\/NoVmp#vmprotect-nope\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>VMProtect? Nope.<\/strong><\/a><\/h2>\n\n\n\n<p>NoVmp is a project devirtualizing VMProtect x64 3.0 &#8211; 3.5 (latest) into optimized VTIL and optionally recompiling back to x64 using the\u00a0<a href=\"https:\/\/github.com\/vtil-project\/VTIL-Core\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Virtual-machine Translation Intermediate Language<\/a>\u00a0library. It is rather experimental and is mostly a PoC I wanted to release. Most things can be improved especially with the new NativeLifters repo, but it did not exist back in the time this was written.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-usage\"><a href=\"https:\/\/github.com\/can1357\/NoVmp#usage\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>Usage<\/strong><\/a><\/h2>\n\n\n\n<p>NoVmp accepts&nbsp;<strong>unpacked binaries<\/strong>, so if your binary is packed you&#8217;ll have to dump it first, additionally if you did dump it using a tool like Scylla, you&#8217;ll have to provide the original image base using the&nbsp;<code>-base<\/code>&nbsp;parameter like so:<\/p>\n\n\n\n<p><code>-base 0x14000000<\/code><\/p>\n\n\n\n<p>By default NoVmp will parse every single jump into a VM, if you are only interested in a number of&nbsp;<strong>specific<\/strong>&nbsp;virtualized routines you can use the&nbsp;<code>-vms<\/code>&nbsp;parameter like so with relative virtual addresses:<\/p>\n\n\n\n<p><code>-vms 0x729B81 0x72521<\/code><\/p>\n\n\n\n<p>These addresses should be pointing at the VMEnter, as shown below:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>By default section discovery is automatic, but in case your calls are not being chained you should try adding the VMProtect section name into the section list using&nbsp;<code>-sections<\/code>&nbsp;as shown below:<\/p>\n\n\n\n<p><code>-sections .xxx0 .yyy0<\/code><\/p>\n\n\n\n<p>Note that the&nbsp;<code>.&lt;vmp&gt;1<\/code>&nbsp;section is the merged VMProtect DLL which should not be inputted.<\/p>\n\n\n\n<p>Additionally you can use any of the following switches:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>-noopt<\/code>: Disables optimization.<\/li>\n\n\n\n<li><code>-opt:constant<\/code>: Optimizes the VMProtect Ultra constant obfuscation out.<\/li>\n\n\n\n<li><code>-experimental:recompile<\/code>: Enables the experimental x64 compiler.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-known-bugs\"><a href=\"https:\/\/github.com\/can1357\/NoVmp#known-bugs\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>Known Bugs<\/strong><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Known issues from VTIL-Core, mainly the lack of jump table support and propagation passes taking too long\/not being great which are being worked on.<\/li>\n\n\n\n<li>Binaries compiled with relocations stripped are not fully supported yet.<\/li>\n\n\n\n<li>Experimental compiler is a borderline broken demo, issues related to it should not be submitted as it&#8217;ll be reworked and will be in VTIL-Core.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the world of NoVmp, a groundbreaking project that aims to unravel the complexities of VMProtect x64 3.0 &#8211; 3.5. In this article, we&#8217;ll dive into the intriguing realm of devirtualization, exploring how NoVmp utilizes VTIL (Virtual-machine Translation Intermediate Language) to breathe new life into protected binaries. Get ready to unlock the secrets of [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":31293,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,6414],"class_list":["post-31254","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-novmp"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NoVmp<\/title>\n<meta name=\"description\" content=\"Welcome to the world of NoVmp, a groundbreaking project that aims to unravel the complexities of VMProtect x64 3.0 - 3.5.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/novmp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NoVmp\" \/>\n<meta property=\"og:description\" content=\"Welcome to the world of NoVmp, a groundbreaking project that aims to unravel the complexities of VMProtect x64 3.0 - 3.5.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/novmp\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-14T07:18:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-14T07:18:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/novmp\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/novmp\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"NoVmp &#8211; Unlocking VMProtect x64 With VTIL-Powered Devirtualization\",\"datePublished\":\"2023-11-14T07:18:27+00:00\",\"dateModified\":\"2023-11-14T07:18:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/novmp\/\"},\"wordCount\":361,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/novmp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"NoVmp\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/novmp\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/novmp\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/novmp\/\",\"name\":\"NoVmp\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/novmp\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/novmp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp\",\"datePublished\":\"2023-11-14T07:18:27+00:00\",\"dateModified\":\"2023-11-14T07:18:30+00:00\",\"description\":\"Welcome to the world of NoVmp, a groundbreaking project that aims to unravel the complexities of VMProtect x64 3.0 - 3.5.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/novmp\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/novmp\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NoVmp","description":"Welcome to the world of NoVmp, a groundbreaking project that aims to unravel the complexities of VMProtect x64 3.0 - 3.5.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/novmp\/","og_locale":"en_US","og_type":"article","og_title":"NoVmp","og_description":"Welcome to the world of NoVmp, a groundbreaking project that aims to unravel the complexities of VMProtect x64 3.0 - 3.5.","og_url":"https:\/\/kalilinuxtutorials.com\/novmp\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-11-14T07:18:27+00:00","article_modified_time":"2023-11-14T07:18:30+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/novmp\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/novmp\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"NoVmp &#8211; Unlocking VMProtect x64 With VTIL-Powered Devirtualization","datePublished":"2023-11-14T07:18:27+00:00","dateModified":"2023-11-14T07:18:30+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/novmp\/"},"wordCount":361,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/novmp\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","NoVmp"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/novmp\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/novmp\/","url":"https:\/\/kalilinuxtutorials.com\/novmp\/","name":"NoVmp","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/novmp\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/novmp\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp","datePublished":"2023-11-14T07:18:27+00:00","dateModified":"2023-11-14T07:18:30+00:00","description":"Welcome to the world of NoVmp, a groundbreaking project that aims to unravel the complexities of VMProtect x64 3.0 - 3.5.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/novmp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/novmp\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiiVbYOVISLX7L_vk2kiGyjxlHIIlomVd4MpHJvbWQemLenGTzbFKmmqhQYPguMDdFZVs0v22tUp6j1YaEqvIIMxEtBZwumyPXCEj_j_JdOb0JWHjotY6FKXawDo3Cx4MiZlOuNRkjUlqPn-nM35Tx53Ju90jLkDYZHQ-YPepbo_QV1cS-oE1M129r06w\/s16000\/NOVmp.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":11517,"url":"https:\/\/kalilinuxtutorials.com\/vmpdump\/","url_meta":{"origin":31254,"position":0},"title":"VMPDump : A Dynamic VMP Dumper And Import Fixer","author":"R K","date":"September 24, 2020","format":false,"excerpt":"VMPDump is a dynamic VMP dumper and import fixer, powered by VTIL. Works for VMProtect 3.X x64. Before vs After Usage VMPDump.exe <Target PID> \"<Target Module>\" [-ep=<Entry Point RVA>] [-disable-reloc] Arguments: <Target PID>: The ID of the target process, in decimal or hex form.<Target Module>: The name of the module\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31216,"url":"https:\/\/kalilinuxtutorials.com\/titan\/","url_meta":{"origin":31254,"position":1},"title":"Titan &#8211; VMProtect Devirtualizer","author":"Varshini","date":"November 15, 2023","format":false,"excerpt":"I'm releasing my VMProtect devirtualizer for others to research, learn, and improve. This project started in 2018 as a hobby project and was rewritten at least 4 times. During my research, I've met with awesome people, made friends, and learned a lot. The tool is for educational purposes only, it\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEirqSy8beSzRRCznqsFl960hiQLzKhtlvXzDTHyAQvZqkRz69EChcYnHohQvba7G3UTzedK4yzcbU2yp70gbxsOSXKLiWh9cMmqUw0FuFjze0XE2amz_4HOSZ_pLWDO12HgGXn6msusamfwPW4JDPJ_WEhuqsUsH-rx7MdXlQvn_JrasvyBmUZkgUwThA\/s16000\/Titan.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEirqSy8beSzRRCznqsFl960hiQLzKhtlvXzDTHyAQvZqkRz69EChcYnHohQvba7G3UTzedK4yzcbU2yp70gbxsOSXKLiWh9cMmqUw0FuFjze0XE2amz_4HOSZ_pLWDO12HgGXn6msusamfwPW4JDPJ_WEhuqsUsH-rx7MdXlQvn_JrasvyBmUZkgUwThA\/s16000\/Titan.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEirqSy8beSzRRCznqsFl960hiQLzKhtlvXzDTHyAQvZqkRz69EChcYnHohQvba7G3UTzedK4yzcbU2yp70gbxsOSXKLiWh9cMmqUw0FuFjze0XE2amz_4HOSZ_pLWDO12HgGXn6msusamfwPW4JDPJ_WEhuqsUsH-rx7MdXlQvn_JrasvyBmUZkgUwThA\/s16000\/Titan.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEirqSy8beSzRRCznqsFl960hiQLzKhtlvXzDTHyAQvZqkRz69EChcYnHohQvba7G3UTzedK4yzcbU2yp70gbxsOSXKLiWh9cMmqUw0FuFjze0XE2amz_4HOSZ_pLWDO12HgGXn6msusamfwPW4JDPJ_WEhuqsUsH-rx7MdXlQvn_JrasvyBmUZkgUwThA\/s16000\/Titan.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEirqSy8beSzRRCznqsFl960hiQLzKhtlvXzDTHyAQvZqkRz69EChcYnHohQvba7G3UTzedK4yzcbU2yp70gbxsOSXKLiWh9cMmqUw0FuFjze0XE2amz_4HOSZ_pLWDO12HgGXn6msusamfwPW4JDPJ_WEhuqsUsH-rx7MdXlQvn_JrasvyBmUZkgUwThA\/s16000\/Titan.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEirqSy8beSzRRCznqsFl960hiQLzKhtlvXzDTHyAQvZqkRz69EChcYnHohQvba7G3UTzedK4yzcbU2yp70gbxsOSXKLiWh9cMmqUw0FuFjze0XE2amz_4HOSZ_pLWDO12HgGXn6msusamfwPW4JDPJ_WEhuqsUsH-rx7MdXlQvn_JrasvyBmUZkgUwThA\/s16000\/Titan.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":27560,"url":"https:\/\/kalilinuxtutorials.com\/protectmytooling\/","url_meta":{"origin":31254,"position":2},"title":"ProtectMyTooling : Multi-Packer Wrapper Letting Us Daisy-Chain Various Packers, Obfuscators And Other Red Team Oriented Weaponry","author":"R K","date":"November 8, 2022","format":false,"excerpt":"ProtectMyTooling is a script that wraps around multitude of packers, protectors, obfuscators, shellcode loaders, encoders, generators to produce complex protected Red Team implants. Your perfect companion in Malware Development CI\/CD pipeline, helping watermark your artifacts, collect IOCs, backdoor and more. ProtectMyToolingGUI.py With ProtectMyTooling you can quickly obfuscate your binaries without\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSKGFPM_KojZEjFJ2K9TDcmJ0kuVNoeM_64Urm4n5e42LE0AiR3EbGH5QVkabBTCxgcWLp_Hd5GB1c4yp9fVHYhzRFuvjNnsM9SWmORi2wLTl9CyiNkNi6DFM4cYIDQBUSDmS9ruzjH5vzAlrlX_EjT4tok7373oJlVkqmP3BaSWDk9PcdBSUASyj7\/s728\/ProtectMyTooling.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSKGFPM_KojZEjFJ2K9TDcmJ0kuVNoeM_64Urm4n5e42LE0AiR3EbGH5QVkabBTCxgcWLp_Hd5GB1c4yp9fVHYhzRFuvjNnsM9SWmORi2wLTl9CyiNkNi6DFM4cYIDQBUSDmS9ruzjH5vzAlrlX_EjT4tok7373oJlVkqmP3BaSWDk9PcdBSUASyj7\/s728\/ProtectMyTooling.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSKGFPM_KojZEjFJ2K9TDcmJ0kuVNoeM_64Urm4n5e42LE0AiR3EbGH5QVkabBTCxgcWLp_Hd5GB1c4yp9fVHYhzRFuvjNnsM9SWmORi2wLTl9CyiNkNi6DFM4cYIDQBUSDmS9ruzjH5vzAlrlX_EjT4tok7373oJlVkqmP3BaSWDk9PcdBSUASyj7\/s728\/ProtectMyTooling.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSKGFPM_KojZEjFJ2K9TDcmJ0kuVNoeM_64Urm4n5e42LE0AiR3EbGH5QVkabBTCxgcWLp_Hd5GB1c4yp9fVHYhzRFuvjNnsM9SWmORi2wLTl9CyiNkNi6DFM4cYIDQBUSDmS9ruzjH5vzAlrlX_EjT4tok7373oJlVkqmP3BaSWDk9PcdBSUASyj7\/s728\/ProtectMyTooling.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":24235,"url":"https:\/\/kalilinuxtutorials.com\/shellcode-template\/","url_meta":{"origin":31254,"position":3},"title":"Shellcode Template : An Easily Modifiable Shellcode Template For Windows X64\/X86","author":"R K","date":"May 9, 2022","format":false,"excerpt":"Shellcode Template is heavily based on\u00a0Austin Hudson's (aka SecIdiot)\u00a0TitanLdr\u00a0It compiles the project into a PE Executable and extracts the .text section Example The entry point of the shellcode looks like this. Of course, this can be changed for your need. First we need to initialize needed libraries and functions by\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiAY70_Nrb-amkj4O6lDDsK0QdpQxfLgz09pTWAjnHA-C5mea466qWQeEfon3rlM4_k4uJCAhtC3n6SY5VVwpRY0Wd3I6AKTluIj0iDQ832ft5zNQgxuqJCwmOp6bgrUJarztyRGnsPb_PB6xeucwqz0OSIWRMEHlRosHGnzCLJv9ahGc27spfLfXum\/s728\/locate_dll2.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiAY70_Nrb-amkj4O6lDDsK0QdpQxfLgz09pTWAjnHA-C5mea466qWQeEfon3rlM4_k4uJCAhtC3n6SY5VVwpRY0Wd3I6AKTluIj0iDQ832ft5zNQgxuqJCwmOp6bgrUJarztyRGnsPb_PB6xeucwqz0OSIWRMEHlRosHGnzCLJv9ahGc27spfLfXum\/s728\/locate_dll2.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiAY70_Nrb-amkj4O6lDDsK0QdpQxfLgz09pTWAjnHA-C5mea466qWQeEfon3rlM4_k4uJCAhtC3n6SY5VVwpRY0Wd3I6AKTluIj0iDQ832ft5zNQgxuqJCwmOp6bgrUJarztyRGnsPb_PB6xeucwqz0OSIWRMEHlRosHGnzCLJv9ahGc27spfLfXum\/s728\/locate_dll2.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiAY70_Nrb-amkj4O6lDDsK0QdpQxfLgz09pTWAjnHA-C5mea466qWQeEfon3rlM4_k4uJCAhtC3n6SY5VVwpRY0Wd3I6AKTluIj0iDQ832ft5zNQgxuqJCwmOp6bgrUJarztyRGnsPb_PB6xeucwqz0OSIWRMEHlRosHGnzCLJv9ahGc27spfLfXum\/s728\/locate_dll2.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":13836,"url":"https:\/\/kalilinuxtutorials.com\/ppldump\/","url_meta":{"origin":31254,"position":4},"title":"PPLdump : Dump The Memory Of A PPL With A Userland Exploit","author":"R K","date":"June 28, 2021","format":false,"excerpt":"PPLdump implements a\u00a0userland\u00a0exploit that was initially discussed by James Forshaw (a.k.a.\u00a0@tiraniddo) - in this\u00a0blog post\u00a0- for\u00a0dumping the memory of any PPL\u00a0as an administrator. I wrote two blog posts about this tool. The first part is about Protected Processes concepts while the second one dicusses the bypass technique itself. Blog post\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":27462,"url":"https:\/\/kalilinuxtutorials.com\/aoratoswin\/","url_meta":{"origin":31254,"position":5},"title":"AoratosWin : A Tool That Removes Traces Of Executed Applications On Windows OS","author":"R K","date":"October 14, 2022","format":false,"excerpt":"AoratosWin is a tool that removes traces of executed applications on Windows OS which can easily be listed with tools such as ExecutedProgramList by Nirsoft. Supported OS (Tested On) Windows 7 (x86, x64)Windows 8 (x86, x64)Windows 8.1 (x86, x64)Windows 10 (x86, x64)Windows 11 (x64) Minimum System Reqs: .NET Framework 4.0\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiCvQLWbrXaxsfMBr6EME1jPJLUE9GhmRPlTS8dz1V_4m06OiccXNo1bXY4hypTwha1Qo051vMfdq9uN40UYuMi29Bg2jYSzoTNEBYZUW5IOciKF4bdVY9n0bq9D_wS1fFAmDDsq-IAZFJc4Lq47_o5hTgQ32Hhx9qd36J2BXJvCPZOr6oOBgH8kUm1\/s728\/AoratosWin.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiCvQLWbrXaxsfMBr6EME1jPJLUE9GhmRPlTS8dz1V_4m06OiccXNo1bXY4hypTwha1Qo051vMfdq9uN40UYuMi29Bg2jYSzoTNEBYZUW5IOciKF4bdVY9n0bq9D_wS1fFAmDDsq-IAZFJc4Lq47_o5hTgQ32Hhx9qd36J2BXJvCPZOr6oOBgH8kUm1\/s728\/AoratosWin.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiCvQLWbrXaxsfMBr6EME1jPJLUE9GhmRPlTS8dz1V_4m06OiccXNo1bXY4hypTwha1Qo051vMfdq9uN40UYuMi29Bg2jYSzoTNEBYZUW5IOciKF4bdVY9n0bq9D_wS1fFAmDDsq-IAZFJc4Lq47_o5hTgQ32Hhx9qd36J2BXJvCPZOr6oOBgH8kUm1\/s728\/AoratosWin.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiCvQLWbrXaxsfMBr6EME1jPJLUE9GhmRPlTS8dz1V_4m06OiccXNo1bXY4hypTwha1Qo051vMfdq9uN40UYuMi29Bg2jYSzoTNEBYZUW5IOciKF4bdVY9n0bq9D_wS1fFAmDDsq-IAZFJc4Lq47_o5hTgQ32Hhx9qd36J2BXJvCPZOr6oOBgH8kUm1\/s728\/AoratosWin.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=31254"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31254\/revisions"}],"predecessor-version":[{"id":31255,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31254\/revisions\/31255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/31293"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=31254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=31254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=31254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}