Funny you mention this -- over the last few days I was actually searching for ways to analyze VMProtect binaries and this was one of the projects that actually held my interest. It's sad that it's still just in alpha stages essentially, but seems to still be in somewhat active development (last commit two weeks ago.)
The only other option I found was the Unicorn Engine and specifically unicorn-pe which just emulates (as in emulating hardware by architecture, not virtualizing like a VM) the binary and uses Blackbone to find all the important data like the 'actual' entrypoint of the binary and a rebuilt IAT, allowing for better analysis in memory. Still quite a process, but much easier than it would have been a few years ago.
VTIL looks promising. I just hope the project doesn't die after the guy is done his PhD or whatever it's for. Main dev (can1357) also has more specific projects that use VTIL to break current VMP implementations, like NoVmp and vmpdump, or for kernel-level analysis, ByePg to disable patchguard. Guy knows what he's doing.
If there was some actual documentation for the project, then maybe I'd write something with it. But for the time being, I can barely make any sense of most of it. Take a look at the Unicorn Engine if you want something a little more mature for emulation of software that has 'some' documentation to work with.