<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Llvm on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/llvm/</link><description>Recent content in Llvm on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/llvm/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tigress_protection</title><link>https://rainmana.github.io/hackyfeed/tools/jonathansalwan-tigress_protection/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jonathansalwan-tigress_protection/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Tigress is a virtualizer and obfuscator for the C programming language that provides extensive defenses against both static and dynamic reverse engineering through advanced code transformation techniques. Its notable features include the generation of diverse virtual instruction sets, embedding of bogus functions, the application of anti de-virtualization measures, and support for continuous runtime code modification. The tool is particularly designed for security researchers looking to protect code integrity and for those involved in code analysis challenges requiring the deobfuscation of protected binaries.&lt;/p&gt;</description></item></channel></rss>