Hikari_pe_x64 |top| May 2026
((annotate("nohikari"))) void normal_function() // no obfuscation
clang-cl.exe /O2 /GS- /c payload.c -mllvm -enable-pass-plugin=C:\Hikari\lib\hikari_pe_x64.dll -mllvm -sub -mllvm -bcf -mllvm -fla -mllvm -split Use lld-link.exe (or MSVC link.exe): hikari_pe_x64
loc_obf_1: mov eax, switch_var cmp eax, 0x1 -> jmp loc_realblock1 cmp eax, 0x2 -> jmp loc_realblock2 ... If prebuilt plugin fails: switch_var cmp eax
Example full obfuscation:
// Opaque predicate example (constant folding resistant) volatile int x = 0; if (x == 0 && (GetTickCount() & 1) == 0) // real code else // dead code jmp loc_realblock1 cmp eax
((annotate("nohikari"))) void normal_function() // no obfuscation
clang-cl.exe /O2 /GS- /c payload.c -mllvm -enable-pass-plugin=C:\Hikari\lib\hikari_pe_x64.dll -mllvm -sub -mllvm -bcf -mllvm -fla -mllvm -split Use lld-link.exe (or MSVC link.exe):
loc_obf_1: mov eax, switch_var cmp eax, 0x1 -> jmp loc_realblock1 cmp eax, 0x2 -> jmp loc_realblock2 ... If prebuilt plugin fails:
Example full obfuscation:
// Opaque predicate example (constant folding resistant) volatile int x = 0; if (x == 0 && (GetTickCount() & 1) == 0) // real code else // dead code