# EazyDevirt1 **Repository Path**: pilotstation/eazy-devirt11 ## Basic Information - **Project Name**: EazyDevirt1 - **Description**: No description available - **Primary Language**: Unknown - **License**: GPL-3.0 - **Default Branch**: 13-resolver-issues - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2025-05-17 - **Last Updated**: 2025-05-17 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README
# EazyDevirt [EazyDevirt] is an open-source tool that automatically restores the original IL code from an assembly virtualized with [Eazfuscator.NET]. [Installation](#installation) • [Usage](#usage) • [Features](#features) • [Roadmap](#roadmap) • [Support](#support) [![forthebadge](https://raw.githubusercontent.com/BraveUX/for-the-badge/672423ab03eb060aa1ac72494900569fb9842b16/src/images/badges/powered-by-black-magic.svg)](https://github.com/BraveUX/for-the-badge) [![GPLv3 License](https://img.shields.io/badge/License-GPL%20v3-orangered.svg)](https://opensource.org/licenses/)
## Usage ```console $ EazyDevirt [] [options] Arguments: Path to target assembly Path to output directory [default: ./eazydevirt-output] Options: -v, --verbose Level of verbosity [1: Verbose, 2: Very Verbose, 3: Very Very Verbose] [default: 0] --preserve-all Preserves all metadata tokens [default: False] --no-verify Don't verify labels or compute max stack for devirtualized methods [default: False] -kt, --keep-types Keeps obfuscator types [default: False] --save-anyway Saves output of devirtualizer even if it fails [default: False] --only-save-devirted Only saves successfully devirtualized methods (This option only matters if you use the save anyway option) [default: False] --require-deps-for-generics Require dependencies when resolving generic methods for accuracy [default: True] --version Show version information -?, -h, --help Show help and usage information ``` #### Example: ```console $ EazyDevirt.exe test.exe -v 3 --preserve-all --save-anyway true ``` ### Notes Don't rename any members before devirtualization, as [Eazfuscator.NET] resolves members using names rather than tokens. [EazyDevirt] requires control flow and other protections (such as string encryption or delegate proxies) to be removed first. To remove string encryption, you can use [EazFixer]. For control flow obfuscation, you can try using de4dot: ```console $ de4dot --only-cflow-deob ``` ## Installation To clone the project use: ```console $ git clone --recurse-submodules https://github.com/puff/EazyDevirt.git ``` Then you can use your favourite IDE or build from the command line: ```console $ dotnet restore $ dotnet build -c Release ``` ## Features - Automatically identify virtual opcodes and devirtualize methods - Emulated binary reader using [Echo] ## Roadmap See the [open issues](https://github.com/puff/EazyDevirt/issues) for a list of proposed features (and known issues). ## Support [EazyDevirt] is targeted at version 2022.2 of [Eazfuscator.NET]. If the version you're trying this tool on is not supported, you will need to add support for it yourself. You can take a look at the differences between the branches to see what you need to change. \ The [old-2022](https://github.com/puff/EazyDevirt/tree/old-2022.2) branch supports a different version of 2022.2 than the [main](https://github.com/puff/EazyDevirt/tree/main) branch. The [old-2021](https://github.com/puff/EazyDevirt/tree/old-2021) branch supports an unknown version from 2021. ### Credits - [void-stack] for the many contributions. - [saneki] for the [eazdevirt] project. - [TobitoFatitoRE] for the [HexDevirt] project. - [Washi1337] for the [AsmResolver] and [Echo] libraries. And a thank you, to [all other contributors](https://github.com/puff/EazyDevirt/graphs/contributors). [EazyDevirt]:https://github.com/puff/EazyDevirt [eazdevirt]:https://github.com/saneki/eazdevirt [HexDevirt]:https://github.com/TobitoFatitoRE/HexDevirt [TobitoFatitoRE]:https://github.com/TobitoFatitoRE [void-stack]:https://github.com/void-stack [saneki]:https://github.com/saneki [Washi1337]:https://github.com/Washi1337 [AsmResolver]:https://github.com/Washi1337/AsmResolver [Echo]:https://github.com/Washi1337/Echo [Eazfuscator.NET]:https://www.gapotchenko.com/eazfuscator.net [EazFixer]:https://github.com/holly-hacker/EazFixer