A Deobfuscator for a Virtual Machine based Obfuscator Author: Dhawal Darji
This tool tries to devirtualize and deobfuscate a virtual-machine(VM) based obfuscated code. This tool is designed to analyze code obfuscated with the Fish-White VM from Oreans CodeVirtualizer.
Python 3.5 or higher
This version of deVirtualizer supports run trace from OllyDBG 1.x only.
Follow these steps to run the code:
Open a terminal->python3 deVirtualizer.py run_trace.txt