السلام علیک و رحمت الله 
When an application is protected with Virtual Machine Protection, the actual application code is converted into a set of custom instructions (VM bytecode). This causes disassemblers like IDA/Ghidra to see obfuscated code.
VMDragonSlayer is an advanced research and analysis framework for breaking through the layers of Virtual Machine Protectors like VMProtect 2.x/3.x, Themida, and custom VMs in malware.
This tool is mostly used by security researchers, reverse engineers, and malware analysts.
إِنَّ اللَّهَ لَا يَظْلِمُ النَّاسَ شَيْئًا وَلَكِنَّ النَّاسَ أَنْفُسَهُمْ يَظْلِمُونَ

When an application is protected with Virtual Machine Protection, the actual application code is converted into a set of custom instructions (VM bytecode). This causes disassemblers like IDA/Ghidra to see obfuscated code.
VMDragonSlayer is an advanced research and analysis framework for breaking through the layers of Virtual Machine Protectors like VMProtect 2.x/3.x, Themida, and custom VMs in malware.
This tool is mostly used by security researchers, reverse engineers, and malware analysts.
https://github.com/poppopjmp/VMDragonSlayer
إِنَّ اللَّهَ لَا يَظْلِمُ النَّاسَ شَيْئًا وَلَكِنَّ النَّاسَ أَنْفُسَهُمْ يَظْلِمُونَ

