belabs_engineer (@belabs_engineer) 's Twitter Profile
belabs_engineer

@belabs_engineer

Interested in anything (de)obfuscation related.

ID: 1855688296485277696

calendar_today10-11-2024 19:05:48

45 Tweet

17 Followers

35 Following

Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

We are excited to release our second blog post discussing our technical capabilities of integrating llvm-msvc compiled code into already compiled programs in efforts to build anti-cheats, anti-tamper, packers, import protectors, anti-debug functionality, runtime tracing, and much

Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

Given the recent events with VMPSoft DMCA'ing educational YouTube videos demonstrating how to unpack malware protected with VMProtect, we have decided to release a free to use unpacker which works for all versions of VMP 3.x including the most recent version. Simply sign

Given the recent events with VMPSoft DMCA'ing educational YouTube videos demonstrating how to unpack malware protected with VMProtect, we have decided to release a free to use unpacker which works for all versions of VMP 3.x including the most recent version.

Simply sign
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

What has BELabs been up to ⁉️ Check out these new SSE based obfuscations. 🫣 We have completely rewritten our compiler from the ground up to pave the way for ARM support. ✅ This has allowed us to make the world's strongest bin2bin obfuscation framework even stronger.💪 The

What has BELabs been up to ⁉️ 
Check out these new SSE based obfuscations. 🫣
We have completely rewritten our compiler from the ground up to pave the way for ARM support. ✅ 

This has allowed us to make the world's strongest bin2bin obfuscation framework even stronger.💪
The
IDontCode (@_xeroxz) 's Twitter Profile Photo

This is a great read for people interested in hypervisor development in both pre-boot and post-boot (Windows) environment, the source is public and written in rust as well. Great work memN0ps 😀🙌 github.com/memN0ps/matrix… github.com/memN0ps/illusi… memn0ps.github.io/hypervisors-fo…

GuidedHacking (@guidedhacking) 's Twitter Profile Photo

Game hackers have defined the bleeding edge of low-level security innovation for the past 10 years. Infosec will never give us the respect we deserve, but for the people who actually follow our tutorials, it has a profound impact on their lives.

Game hackers have defined the bleeding edge of low-level security innovation for the past 10 years.

Infosec will never give us the respect we deserve, but for the people who actually follow our tutorials, it has a profound impact on their lives.
GuidedHacking (@guidedhacking) 's Twitter Profile Photo

Kids who are reverse engineering virtualized anticheat for the past 3 years enter the infosec workforce after graduation & realize they are 100x more experienced than their peers We have thousands of success stories, but you'll never hear 'em because they are doers not talkers

Hussein Muhaisen (@husseinmuhaisen) 's Twitter Profile Photo

if you want to get to know someone(Nemi) who actually worked at Blizzard, built, and SOLD ACs, then listen to this episode: youtu.be/6xET66eitYY

Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

Our CodeDefender SaaS has received a major update which includes the following: 🛠️Our new and improved compiler framework 💥SSE hardened mutations 🚀New UI/UX interface 💪Custom obfuscation pass configuration 🔗Register now: app.codedefender.io #reverseengineering

Our CodeDefender SaaS has received a major update which includes the following:

🛠️Our new and improved compiler framework
💥SSE hardened mutations
🚀New UI/UX interface
💪Custom obfuscation pass configuration
🔗Register now: app.codedefender.io

#reverseengineering
Struth (@struthgaming) 's Twitter Profile Photo

I've irreparably harmed my brain watching so many Call of Shame videos to research and debunk this absolute clown. Mainly covering the "Peer reviewed", "PHD-level" white paper and how the Guardian Truesight anti-cheat actually works (or how it doesn't work?). YT -

I've irreparably harmed my brain watching so many Call of Shame videos to research and debunk this absolute clown. 

Mainly covering the "Peer reviewed", "PHD-level" white paper and how the Guardian Truesight anti-cheat actually works (or how it doesn't work?). YT -
Matt Paoletti (@riotk3o) 's Twitter Profile Photo

We are rolling out additional device security requirements to highly suspicious players in League of Legends, preventing methods cheaters use to attempt to get around our systems. support-leagueoflegends.riotgames.com/hc/en-us/artic…

We are rolling out additional device security requirements to highly suspicious players in League of Legends, preventing methods cheaters use to attempt to get around our systems. support-leagueoflegends.riotgames.com/hc/en-us/artic…
LaurieWired (@lauriewired) 's Twitter Profile Photo

of course, this code is complete AI slop. Right off the bat, headers aren’t passed for POST/PUT/DELETE. Both the help and -v options flat out lie about what was sent. Literally half of the flags are no-ops. Oh, and it just silently drops authentication, so that’s fun. But

RE//verse (@reverseconf) 's Twitter Profile Photo

Bas Zweers (belabs_engineer) and James McGowan (@backengineerlab) bring a look at a real world commercial binary obfuscator to RE//verse 2026. This talk walks through analysis and custom tooling to peel back obfuscation on Windows kernel mode anti cheat and ends with a full

Bas Zweers (<a href="/belabs_engineer/">belabs_engineer</a>) and James McGowan (@backengineerlab) bring a look at a real world commercial binary obfuscator to RE//verse 2026. This talk walks through analysis and custom tooling to peel back obfuscation on Windows kernel mode anti cheat and ends with a full
RE//verse (@reverseconf) 's Twitter Profile Photo

Catch this talk at RE//verse 2026. Xusheng Li walks through breaking encrypted USB drives with time travel debugging and shows how TTD in Binary Ninja makes it simple to spot “encrypted” drives with no real encryption, client side password handling and broken crypto. Tickets on

Catch this talk at RE//verse 2026. Xusheng Li walks through breaking encrypted USB drives with time travel debugging and shows how TTD in Binary Ninja makes it simple to spot “encrypted” drives with no real encryption, client side password handling and broken crypto. Tickets on
RE//verse (@reverseconf) 's Twitter Profile Photo

Carl Svensson (@zetatwo) is bringing Age of Empires II Definitive Edition to RE//verse 2026 as a playground for tooling. This talk walks through Binary Ninja automation to decrypt and deobfuscate game code and a BNIL query system for matching obfuscated instruction patterns. If

Carl Svensson (@zetatwo) is bringing Age of Empires II Definitive Edition to RE//verse 2026 as a playground for tooling. This talk walks through Binary Ninja automation to decrypt and deobfuscate game code and a BNIL query system for matching obfuscated instruction patterns. If
RE//verse (@reverseconf) 's Twitter Profile Photo

Laurie (LaurieWired) is keynoting RE//verse 2026 with Thinking Like a Compiler: Obfuscation from the Other Side! From LLVM passes baked into the build to custom VM bytecode that leaves decompilers guessing, this one goes straight for the toolchain. Get your ticket asap:

Laurie (<a href="/lauriewired/">LaurieWired</a>) is keynoting RE//verse 2026 with Thinking Like a Compiler: Obfuscation from the Other Side! From LLVM passes baked into the build to custom VM bytecode that leaves decompilers guessing, this one goes straight for the toolchain. Get your ticket asap:
RE//verse (@reverseconf) 's Twitter Profile Photo

Reverse engineers, this is your conference. RE//verse kicks off in Orlando this March! Console and Xbox hacking, firmware targets, real world anti RE, and many talks you won't want to miss. Tickets are limited and selling fast, so grab yours before they are gone:

Reverse engineers, this is your conference. RE//verse kicks off in Orlando this March! Console and Xbox hacking, firmware targets, real world anti RE, and many talks you won't want to miss. Tickets are limited and selling fast, so grab yours before they are gone: