Back Engineering Labs (@backengineerlab) 's Twitter Profile
Back Engineering Labs

@backengineerlab

CodeDefender Discord: discord.gg/sgedeapTMm

ID: 1617397198681157632

linkhttp://back.engineering calendar_today23-01-2023 05:42:30

20 Tweet

935 Takipçi

4 Takip Edilen

Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

🚀 We've been hard at work to make CodeDefender even better for you! Here's what's new: ✨ A sleek new UI for our SaaS platform 🧩 A Mixed Boolean Arithmetic obfuscation pass 🔗 A brand-new API to supercharge your workflows docs.codedefender.io postman.com/back-engineeri…

🚀 We've been hard at work to make CodeDefender even better for you! Here's what's new:

✨ A sleek new UI for our SaaS platform 
🧩 A Mixed Boolean Arithmetic obfuscation pass
🔗 A brand-new API to supercharge your workflows

docs.codedefender.io
postman.com/back-engineeri…
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

Loop-Based Semantic Encoding is a transformation that takes simple operations (add, and, xor, sub) and transforms them into a loop structure. We have made this obfuscation technique available for medium and large tier subscribers to CodeDefender. Docs: docs.codedefender.io/features/funct…

Loop-Based Semantic Encoding is a transformation that takes simple operations (add, and, xor, sub) and transforms them into a loop structure. We have made this obfuscation technique available for medium and large tier subscribers to CodeDefender. 

Docs: docs.codedefender.io/features/funct…
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

We have added Rust GameAssembly.dll module coverage statistics to our binstats repo. We are able to statically uncover over 99% of functions within the il2cpp generated DLL (242mb) and transform them! No PDB or source code was used to generate these statistics!

We have added <a href="/playrust/">Rust</a> GameAssembly.dll module coverage statistics to our binstats repo. We are able to statically uncover over 99% of functions within the il2cpp generated DLL (242mb) and transform them! No PDB or source code was used to generate these statistics!
5unkn0wn (@5unkn0wn) 's Twitter Profile Photo

Recently, Back Engineering Labs released the crackme obfuscated by the CodeDefender and I reversed the binary: gist.github.com/5unKn0wn/24fa0…. The crackme implemented modified SipHash24, and the goal is to find the input that matches the hash. The obfuscation was nice and quite a challenge !

Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

CodeDefender SaaS now provides you with a debug map file format so that you can debug crashes in your binary code. Soon we will update your PDB file (if provided) so you can use it directly in WinDbg and Visual Studio, however this map file format works for PE files provided

CodeDefender SaaS now provides you with a debug map file format  so that you can debug crashes in your binary code.

Soon we will update your PDB file (if provided) so you can use it directly in WinDbg and Visual Studio, however this map file format works for PE files provided
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

We have made public a tool called "pdbgen2" which can generate a PDB file for CodeDefender.io obfuscated binaries. The PDB offers function/basic block level granularity. This is very useful for analyzing crash dumps and debugging your obfuscated code in production!

We have made public a tool called "pdbgen2" which can generate a PDB file for CodeDefender.io obfuscated binaries. The PDB offers function/basic block level granularity. 

This is very useful for analyzing crash dumps and debugging your obfuscated code in production!
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

We are very excited to sponsor Duncan Ogilvie 🍍 with 500$ His open source contributions have made it possible to do what we do. If you have ever benefited from using x64dbg.com or other tools developed by Duncan Ogilvie 🍍 consider sponsoring him on github. Special thanks to all of

Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

We are excited to release our second blog post discussing our technical capabilities of integrating llvm-msvc compiled code into already compiled programs in efforts to build anti-cheats, anti-tamper, packers, import protectors, anti-debug functionality, runtime tracing, and much

Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

Given the recent events with VMPSoft DMCA'ing educational YouTube videos demonstrating how to unpack malware protected with VMProtect, we have decided to release a free to use unpacker which works for all versions of VMP 3.x including the most recent version. Simply sign

Given the recent events with VMPSoft DMCA'ing educational YouTube videos demonstrating how to unpack malware protected with VMProtect, we have decided to release a free to use unpacker which works for all versions of VMP 3.x including the most recent version.

Simply sign
GuidedHacking (@guidedhacking) 's Twitter Profile Photo

🚨 How are the geniuses at Back Engineering Labs revolutionizing binary obfuscation with CodeDefender.io? Learn about the unique challenges & solutions in bin2bin, virtualization & anti-tamper. See CodeDefender in action with a demo at the end! 👉youtu.be/3LOGxOHfUHg

🚨 How are the geniuses at <a href="/BackEngineerLab/">Back Engineering Labs</a> revolutionizing binary obfuscation with CodeDefender.io?

Learn about the unique challenges &amp; solutions in bin2bin, virtualization &amp; anti-tamper.

See CodeDefender in action with a demo at the end!

👉youtu.be/3LOGxOHfUHg
GuidedHacking (@guidedhacking) 's Twitter Profile Photo

Can your bin2bin do this and still boot? CodeDefender.io can. See it in action with a demo at the end! 👉youtu.be/3LOGxOHfUHg

Can your bin2bin do this and still boot?
CodeDefender.io can.

See it in action with a demo at the end! 
👉youtu.be/3LOGxOHfUHg
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

What has BELabs been up to ⁉️ Check out these new SSE based obfuscations. 🫣 We have completely rewritten our compiler from the ground up to pave the way for ARM support. ✅ This has allowed us to make the world's strongest bin2bin obfuscation framework even stronger.💪 The

What has BELabs been up to ⁉️ 
Check out these new SSE based obfuscations. 🫣
We have completely rewritten our compiler from the ground up to pave the way for ARM support. ✅ 

This has allowed us to make the world's strongest bin2bin obfuscation framework even stronger.💪
The
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

Our CodeDefender SaaS has received a major update which includes the following: 🛠️Our new and improved compiler framework 💥SSE hardened mutations 🚀New UI/UX interface 💪Custom obfuscation pass configuration 🔗Register now: app.codedefender.io #reverseengineering

Our CodeDefender SaaS has received a major update which includes the following:

🛠️Our new and improved compiler framework
💥SSE hardened mutations
🚀New UI/UX interface
💪Custom obfuscation pass configuration
🔗Register now: app.codedefender.io

#reverseengineering
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

🚀 CodeDefender SDK now supports source-level macros! Obfuscate functions in Rust/C/C++ by tagging them with your pre-defined obfuscation profile. 🦀 #[codedefender("Profile1")] 💻 CODEDEFENDER("Profile1", ...) Docs + examples 👉 github.com/codedefender-i… #infosec #rustlang

🚀 CodeDefender SDK now supports source-level macros!

Obfuscate functions in Rust/C/C++ by tagging them with your pre-defined obfuscation profile.

🦀 #[codedefender("Profile1")]
💻 CODEDEFENDER("Profile1", ...)

Docs + examples 👉 github.com/codedefender-i…

#infosec #rustlang
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

🧰 CodeDefender API and CLI are live Protect binaries from the terminal or Rust SDK Upload → Analyze → Obfuscate → Download YAML configs give full control over passes, symbols, and transform logic 🔗 github.com/codedefender-i… 📔 docs.codedefender.io/features/api

🧰 CodeDefender API and CLI are live

Protect binaries from the terminal or Rust SDK

Upload → Analyze → Obfuscate → Download

YAML configs give full control over passes, symbols, and transform logic

🔗 github.com/codedefender-i…
📔  docs.codedefender.io/features/api
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

❗️ We discovered a bug in Microsoft's driver compliance checks which are used to determine if "Memory Integrity" can be enabled on a system. ❌The function "vsbapi!HvciIsDriverImage" is comparing an RVA against the raw file size. learn.microsoft.com/en-us/answers/…

❗️ We discovered a bug in Microsoft's driver compliance checks which are used to determine if "Memory Integrity" can be enabled on a system. 

❌The function "vsbapi!HvciIsDriverImage" is comparing an RVA against the raw file size.

learn.microsoft.com/en-us/answers/…