feat: Finalize memory protection logic, add GUI/CLI options, and fix README typos

- Added the original source code that generates the memory protection stub as a comment in the stub.
- Added a memory protection flag to the CLI and an option to the GUI.
- Improved CLI help text to be more detailed and explanatory.
- Updated README.md.
This commit is contained in:
keowu
2025-07-25 20:30:20 -03:00
parent b8a571871d
commit 487f061d6c
5 changed files with 158 additions and 2 deletions

View File

@@ -24,6 +24,10 @@ Options:
--iat Enable IAT obfuscation
--random-section Use random PE section
--keep-original Keep original code (don't remove it)
--AntiDebug Inserts anti-debugging capabilities and terminates the protected binary if a debugger is detected.
--Troll Crashes the entire OS if a debugger is detected (requires --AntiDebug).
--AntiDump Inserts anti-dump mechanisms that break the binary in memory, making dumps harder to analyze.
--MemoryProtection Protects obfuscated code against in-memory or on-disk patching.
--procs <comma,separated,names> Procedures to obfuscate (default: main, invoke_main, ...)
--help Show this help message
@@ -87,6 +91,7 @@ auto main(int argc, char* argv[]) -> int {
config.m_isTrollRerversers = has_flag(args, "--troll");
config.m_isAntiDebug = has_flag(args, "--AntiDebug");
config.m_isAntiDump = has_flag(args, "--AntiDump");
config.m_isMemoryProtection = has_flag(args, "--MemoryProtection");
if (has_flag(args, "--procs")) {
auto rawList = args["--procs"];