open-obfuscator (@open_obfuscator) 's Twitter Profile
open-obfuscator

@open_obfuscator

A free and open-source obfuscator for mobile applications.

Discord: discord.obfuscator.re

ID: 1576075558596771844

linkhttps://obfuscator.re calendar_today01-10-2022 05:05:36

22 Tweet

423 Followers

69 Following

open-obfuscator (@open_obfuscator) 's Twitter Profile Photo

You can now give a try at this new open-obfuscator challenge specially cooked with dProtect and O-MVLL: obfuscator.re/challenges/ Sponsored by Vector 35 Build38 and eShard .

You can now give a try at this new open-obfuscator challenge
specially cooked with dProtect and O-MVLL:

obfuscator.re/challenges/

Sponsored by <a href="/vector35/">Vector 35</a> <a href="/build38dotcom/">Build38</a> and <a href="/eshard/">eShard</a> .
open-obfuscator (@open_obfuscator) 's Twitter Profile Photo

Congratulation to @HodelAaron for being the first one to find the correct login/password in about 2 days! It took far less time than expected and he exploited in a talented way, the weaknesses left in the protection of the application.

Congratulation to @HodelAaron for being the first one to find the correct login/password in about 2 days! 

It took far less time than expected and he exploited in a talented way, the weaknesses left in the protection of the application.
open-obfuscator (@open_obfuscator) 's Twitter Profile Photo

Congratulations to Jeroen Beckers who is the second participant to find the login/password! His technique is completely different from @HodelAaron so it's great to see the different approachs.

Congratulations to <a href="/Dauntless/">Jeroen Beckers</a> who is the second participant to find the login/password!

His technique is completely different from @HodelAaron so it's great to see the different approachs.
open-obfuscator (@open_obfuscator) 's Twitter Profile Photo

And there is a third winner who finished the challenge! Well done to Alemdar. So far, the challenge has been (uniquely) downloaded 533 times and 3 people managed to break it. There are still some aspects that have not been uncovered so do not hesitate to give it a try ;)

And there is a third winner who finished the challenge! Well done to Alemdar.

So far, the challenge has been (uniquely) downloaded 533 times and 3 people managed to break it. There are still some aspects that have not been uncovered so do not hesitate to give it a try ;)
Sam Russell (@samrussellnz) 's Twitter Profile Photo

Playing with LLVM based control flow flattening (heavily inspired by Romain THOMAS's open-obfuscator), super basic initial demo is running github.com/samrussell/obf… Writeup will come later (and Vector 35 based attacks!)

Playing with LLVM based control flow flattening (heavily inspired by <a href="/rh0main/">Romain THOMAS</a>'s <a href="/open_obfuscator/">open-obfuscator</a>), super basic initial demo is running github.com/samrussell/obf…

Writeup will come later (and <a href="/vector35/">Vector 35</a> based attacks!)