.NET Reverse Engineer for Rika.NET De-virtualizer need Software Development
Contact person: .NET Reverse Engineer for Rika.NET De-virtualizer
Phone:Show
Email:Show
Location: Athens, Greece
Budget: Recommended by industry experts
Time to start: As soon as possible
Project description:
"I need an experienced .NET reverse engineer to build a tool that can de-virtualize assemblies protected by [login to view URL] (VM obfuscation).
Scope:
Analyze [login to view URL]’s virtual machine (handlers, scrambled element types, prologue/dispatcher).
Implement an automated de-virtualizer that restores the original IL from virtualized methods.
Deliver a working CLI tool (Windows x64, C# preferred, dnlib or similar) with full source code.
Must handle IL reconstruction, metadata resolution, MaxStack issues, and emit valid, runnable assemblies.
Deliverables:
CLI tool + documented source.
Rewritten assemblies with virtualized methods restored.
A short write-up or mapping (JSON/log) showing how handlers were lifted.
Nice to have (optional):
Control flow cleanup, string/resource decryptors, name restoration heuristics.
Payment: Milestone-based. A paid test task (devirt one sample method) will be required first.
Required experience: Prior work with .NET VM protections (ILProtector, [login to view URL], Eazfuscator, ConfuserEx, or custom VMs), dnlib, and IL rewriters." (client-provided description)
Matched companies (5)

TG Coders

Codetreasure Co

HJP Media

Knowforth Tech
