_xeroxz Profile Banner
IDontCode Profile
IDontCode

@_xeroxz

Followers
4K
Following
3K
Media
76
Statuses
282

Compilers, Math, Windows, Obfuscation, x86-64, Hardware Hacking, and everything in-between Cofounder @BackEngineerLab building https://t.co/tlnjvFiuVI

Joined July 2020
Don't wanna be here? Send us removal request.
@_xeroxz
IDontCode
2 years
Anyone have any suggestions for complex windows executable files that could stress test a binary rewriting framework? Building a small suite of them here: https://t.co/uE3FZ8XC0K (already got chrome, llvm, and some other large projects in there)
Tweet card summary image
github.com
A large collection of 32bit and 64bit PE files useful for verifying the correctness of bin2bin transformations - backengineering/bintests
9
9
67
@nickeverdox
Nick Peterson 🇺🇲 ✝️
2 months
Close to 10 years ago when researching different mechanisms of detecting hypervisor introspection via EPT, x-only in particular, I fumbled upon the ERMSB "side channel" :) Seems other folks have figured it out, so worth sharing. https://t.co/skof1mocs5
Tweet card summary image
github.com
Contribute to everdox/ermsb-meme development by creating an account on GitHub.
4
18
90
@_xeroxz
IDontCode
2 months
If there is interest I will add obfuscated Hyper-V, ntdll, and other system modules.
@BackEngineerLab
Back Engineering Labs
2 months
We released a VirtualBox snapshot that includes a custom ntoskrnl.exe and bootmgfw.efi obfuscated with CodeDefender. The snapshot and the protected binaries are available on our GitHub: https://t.co/CSexrtTycM
2
14
106
@33y0re
Connor McGarr
2 months
Today I am happy to release a new blog post about Pointer Authentication (PAC) on Windows ARM64! This post takes a look at the Windows implementation of PAC in both user-mode and kernel-mode. I must say, I have REALLY been enjoying Windows on ARM!! https://t.co/isnItJ0nb3
Tweet card summary image
originhq.com
Enabling you to safely give AI agents the permissions they need, so they can give you the productivity you demand.
8
64
213
@_revng
rev.ng
4 months
Rejection is fine but, needless to say, we're kinda pissed our (actual) talk was rejected and this thing was accepted, but I'll try to be fair. We also presented https://t.co/BpzWlLVmIo at DEF CON Demo labs. That was nice.
2
1
38
@BackEngineerLab
Back Engineering Labs
4 months
We have reached a pivotal point in our business journey with CodeDefender. After much consideration we have decided to refocus our attention towards our quickly expanding B2B customer base. Public access to the CodeDefender SaaS will no longer be available after 09/30/2025. If
0
2
18
@BackEngineerLab
Back Engineering Labs
4 months
We have recently released a small side project called "Tether" which explores post-compilation extraction of instructions for exclusive server execution. https://t.co/0viHibG0m4
0
6
25
@BackEngineerLab
Back Engineering Labs
5 months
❗️ We discovered a bug in Microsoft's driver compliance checks which are used to determine if "Memory Integrity" can be enabled on a system. ❌The function "vsbapi!HvciIsDriverImage" is comparing an RVA against the raw file size. https://t.co/CoaHNWT3RY
3
6
63
@BackEngineerLab
Back Engineering Labs
5 months
🧰 CodeDefender API and CLI are live Protect binaries from the terminal or Rust SDK Upload → Analyze → Obfuscate → Download YAML configs give full control over passes, symbols, and transform logic 🔗 https://t.co/aavdmgdPsW 📔 https://t.co/Jo0Zf6vBGT
0
2
13
@BackEngineerLab
Back Engineering Labs
5 months
🚀 CodeDefender SDK now supports source-level macros! Obfuscate functions in Rust/C/C++ by tagging them with your pre-defined obfuscation profile. 🦀 #[codedefender("Profile1")] 💻 CODEDEFENDER("Profile1", ...) Docs + examples 👉 https://t.co/X98IMAioVw #infosec #rustlang
0
5
32
@BackEngineerLab
Back Engineering Labs
6 months
Our CodeDefender SaaS has received a major update which includes the following: 🛠️Our new and improved compiler framework 💥SSE hardened mutations 🚀New UI/UX interface 💪Custom obfuscation pass configuration 🔗Register now: https://t.co/ygRr2IlqBb #reverseengineering
1
8
38
@_xeroxz
IDontCode
6 months
This is a great read for people interested in hypervisor development in both pre-boot and post-boot (Windows) environment, the source is public and written in rust as well. Great work @memn0ps 😀🙌 https://t.co/2grnJgj5hi https://t.co/Ft32AKrx1P https://t.co/orsBcoXaPP
Tweet card summary image
memn0ps.github.io
Rusty Hypervisors - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion) and Windows Kernel Blue Pill Type-2 Hypervisor in Rust (Codename: Matrix)
0
37
154
@BackEngineerLab
Back Engineering Labs
6 months
What has BELabs been up to ⁉️ Check out these new SSE based obfuscations. 🫣 We have completely rewritten our compiler from the ground up to pave the way for ARM support. ✅ This has allowed us to make the world's strongest bin2bin obfuscation framework even stronger.💪 The
0
6
49
@GuidedHacking
GuidedHacking
7 months
what is CodeDefender and who is the handsome man in the corner? find out tomorrow when we drop our interview with the @BackEngineerLab team
0
7
71
@GuidedHacking
GuidedHacking
7 months
🚨 How are the geniuses at @BackEngineerLab revolutionizing binary obfuscation with https://t.co/hOe9KDXSTf? Learn about the unique challenges & solutions in bin2bin, virtualization & anti-tamper. See CodeDefender in action with a demo at the end! 👉 https://t.co/ExRwrQDLW1
0
17
57
@BackEngineerLab
Back Engineering Labs
7 months
Given the recent events with VMPSoft DMCA'ing educational YouTube videos demonstrating how to unpack malware protected with VMProtect, we have decided to release a free to use unpacker which works for all versions of VMP 3.x including the most recent version. Simply sign
15
132
621
@BackEngineerLab
Back Engineering Labs
8 months
Today we are announcing 🚢SigBreaker 1.0🚢a binary diversification engine purpose built for breaking static signatures in code while maintaining performance and semantic correctness. https://t.co/ugWv9J6SaX https://t.co/9nRW3txoCa
Tweet card summary image
codedefender.io
We’re excited to launch SigBreaker 1.0, a purpose-built binary diversification engine designed to disrupt static signature-based detection—without bloating binaries or hurting performance.
1
16
52
@BackEngineerLab
Back Engineering Labs
9 months
We are excited to release our second blog post discussing our technical capabilities of integrating llvm-msvc compiled code into already compiled programs in efforts to build anti-cheats, anti-tamper, packers, import protectors, anti-debug functionality, runtime tracing, and much
Tweet card summary image
codedefender.io
The next generation of software protection.
0
6
38
@BackEngineerLab
Back Engineering Labs
9 months
We are very excited to sponsor @mrexodia with 500$ His open source contributions have made it possible to do what we do. If you have ever benefited from using https://t.co/YRq86b5F6g or other tools developed by @mrexodia consider sponsoring him on github. Special thanks to all of
3
4
42
@BackEngineerLab
Back Engineering Labs
10 months
We have made public a tool called "pdbgen2" which can generate a PDB file for https://t.co/1w9Q5MXSNe obfuscated binaries. The PDB offers function/basic block level granularity. This is very useful for analyzing crash dumps and debugging your obfuscated code in production!
1
16
105
@BackEngineerLab
Back Engineering Labs
11 months
CodeDefender SaaS now provides you with a debug map file format so that you can debug crashes in your binary code. Soon we will update your PDB file (if provided) so you can use it directly in WinDbg and Visual Studio, however this map file format works for PE files provided
0
1
28