x86byte (@x86byte) 's Twitter Profile
x86byte

@x86byte

Low-Level Security Enthusiast ^ iOS & Windows Vulnerability Researcher & Exploit Developer 👾🥤

ID: 1573103399851200513

linkhttps://github.com/x86byte calendar_today23-09-2022 00:14:27

47 Tweet

54 Followers

710 Following

x86byte (@x86byte) 's Twitter Profile Photo

x86byte.github.io/x86byte_kpwn/a… #reverseengineering #Reverse_Engineering #Obfuscation #Crypter #Cpp17 #cpp #protection #CodeProtect #idapro #Compiler #MSVC #microsot #windows #malwareResearch #malwareanalysis

x86byte.github.io/x86byte_kpwn/a…

#reverseengineering #Reverse_Engineering #Obfuscation #Crypter #Cpp17 #cpp  #protection  #CodeProtect #idapro #Compiler #MSVC #microsot  #windows #malwareResearch #malwareanalysis
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

What has BELabs been up to ⁉️ Check out these new SSE based obfuscations. 🫣 We have completely rewritten our compiler from the ground up to pave the way for ARM support. ✅ This has allowed us to make the world's strongest bin2bin obfuscation framework even stronger.💪 The

What has BELabs been up to ⁉️ 
Check out these new SSE based obfuscations. 🫣
We have completely rewritten our compiler from the ground up to pave the way for ARM support. ✅ 

This has allowed us to make the world's strongest bin2bin obfuscation framework even stronger.💪
The
安坂星海 Azaka || VTuber (@azakasekai_) 's Twitter Profile Photo

occasionally I'd get people asking me "how'd you know what this function is/does by just glancing at it?" it's just years of looking at the same thing over and over again

occasionally I'd get people asking me "how'd you know what this function is/does by just glancing at it?" it's just years of looking at the same thing over and over again
x86byte (@x86byte) 's Twitter Profile Photo

- #VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture (blog.back.engineering/17/05/2021/) - #VMProtect 2 - Part Two, Complete Static Analysis (blog.back.engineering/21/06/2021/) #reverseengineering #virtualisation #Obfuscation

x86byte (@x86byte) 's Twitter Profile Photo

RE-MA Roadmap Repository Update The RE-MA Roadmap (github.com/x86byte/RE-MA-…) has been updated with new resources. Check it out to explore more materials for mastering reverse engineering and malware analysis! links : - github.com/x86byte/RE-MA-… - x86byte.github.io/x86byte_kpwn/a…

RE-MA Roadmap Repository Update
The RE-MA Roadmap (github.com/x86byte/RE-MA-…) has been updated with new resources. Check it out to explore more materials for mastering reverse engineering and malware analysis!

links :
- github.com/x86byte/RE-MA-…

- x86byte.github.io/x86byte_kpwn/a…
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

🚀 CodeDefender SDK now supports source-level macros! Obfuscate functions in Rust/C/C++ by tagging them with your pre-defined obfuscation profile. 🦀 #[codedefender("Profile1")] 💻 CODEDEFENDER("Profile1", ...) Docs + examples 👉 github.com/codedefender-i… #infosec #rustlang

🚀 CodeDefender SDK now supports source-level macros!

Obfuscate functions in Rust/C/C++ by tagging them with your pre-defined obfuscation profile.

🦀 #[codedefender("Profile1")]
💻 CODEDEFENDER("Profile1", ...)

Docs + examples 👉 github.com/codedefender-i…

#infosec #rustlang
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

🧰 CodeDefender API and CLI are live Protect binaries from the terminal or Rust SDK Upload → Analyze → Obfuscate → Download YAML configs give full control over passes, symbols, and transform logic 🔗 github.com/codedefender-i… 📔 docs.codedefender.io/features/api

🧰 CodeDefender API and CLI are live

Protect binaries from the terminal or Rust SDK

Upload → Analyze → Obfuscate → Download

YAML configs give full control over passes, symbols, and transform logic

🔗 github.com/codedefender-i…
📔  docs.codedefender.io/features/api
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

❗️ We discovered a bug in Microsoft's driver compliance checks which are used to determine if "Memory Integrity" can be enabled on a system. ❌The function "vsbapi!HvciIsDriverImage" is comparing an RVA against the raw file size. learn.microsoft.com/en-us/answers/…

❗️ We discovered a bug in Microsoft's driver compliance checks which are used to determine if "Memory Integrity" can be enabled on a system. 

❌The function "vsbapi!HvciIsDriverImage" is comparing an RVA against the raw file size.

learn.microsoft.com/en-us/answers/…
Peter Meerwald-Stadler (@pmeerw) 's Twitter Profile Photo

yet another MBA paper: asmMBA: Robust Virtualization Obfuscation with Assembly-Based Mixed Boolean-Arithmetic (dl.acm.org/doi/pdf/10.114…) unfortuntely, neither the Loki-Blast nor the asmMBA code seems to be available