Some other things that are used during the obfuscation process:
Linear MBA:
Implements only linear MBA but allows you to choose the rewrite operations.
Systems of Linear Equations mod n:
Linear MBA rewriting at its core is solving such a linear system.
Permutation Polynomials:
This lets you generate and invert binary permutation polynomials.
They are not used in the obfuscation process (for now?) but the origin paper that
introduced MBA mentions them as a way to generate non-linear MBA.