IDontCode
@_xeroxz
Followers
4K
Following
3K
Media
76
Statuses
282
Compilers, Math, Windows, Obfuscation, x86-64, Hardware Hacking, and everything in-between Cofounder @BackEngineerLab building https://t.co/tlnjvFiuVI
Joined July 2020
Anyone have any suggestions for complex windows executable files that could stress test a binary rewriting framework? Building a small suite of them here: https://t.co/uE3FZ8XC0K (already got chrome, llvm, and some other large projects in there)
github.com
A large collection of 32bit and 64bit PE files useful for verifying the correctness of bin2bin transformations - backengineering/bintests
9
9
67
Close to 10 years ago when researching different mechanisms of detecting hypervisor introspection via EPT, x-only in particular, I fumbled upon the ERMSB "side channel" :) Seems other folks have figured it out, so worth sharing. https://t.co/skof1mocs5
github.com
Contribute to everdox/ermsb-meme development by creating an account on GitHub.
4
18
90
If there is interest I will add obfuscated Hyper-V, ntdll, and other system modules.
We released a VirtualBox snapshot that includes a custom ntoskrnl.exe and bootmgfw.efi obfuscated with CodeDefender. The snapshot and the protected binaries are available on our GitHub: https://t.co/CSexrtTycM
2
14
106
Today I am happy to release a new blog post about Pointer Authentication (PAC) on Windows ARM64! This post takes a look at the Windows implementation of PAC in both user-mode and kernel-mode. I must say, I have REALLY been enjoying Windows on ARM!! https://t.co/isnItJ0nb3
originhq.com
Enabling you to safely give AI agents the permissions they need, so they can give you the productivity you demand.
8
64
213
Rejection is fine but, needless to say, we're kinda pissed our (actual) talk was rejected and this thing was accepted, but I'll try to be fair. We also presented https://t.co/BpzWlLVmIo at DEF CON Demo labs. That was nice.
2
1
38
We have reached a pivotal point in our business journey with CodeDefender. After much consideration we have decided to refocus our attention towards our quickly expanding B2B customer base. Public access to the CodeDefender SaaS will no longer be available after 09/30/2025. If
0
2
18
We have recently released a small side project called "Tether" which explores post-compilation extraction of instructions for exclusive server execution. https://t.co/0viHibG0m4
0
6
25
❗️ We discovered a bug in Microsoft's driver compliance checks which are used to determine if "Memory Integrity" can be enabled on a system. ❌The function "vsbapi!HvciIsDriverImage" is comparing an RVA against the raw file size. https://t.co/CoaHNWT3RY
3
6
63
🧰 CodeDefender API and CLI are live Protect binaries from the terminal or Rust SDK Upload → Analyze → Obfuscate → Download YAML configs give full control over passes, symbols, and transform logic 🔗 https://t.co/aavdmgdPsW 📔 https://t.co/Jo0Zf6vBGT
0
2
13
🚀 CodeDefender SDK now supports source-level macros! Obfuscate functions in Rust/C/C++ by tagging them with your pre-defined obfuscation profile. 🦀 #[codedefender("Profile1")] 💻 CODEDEFENDER("Profile1", ...) Docs + examples 👉 https://t.co/X98IMAioVw
#infosec #rustlang
0
5
32
Our CodeDefender SaaS has received a major update which includes the following: 🛠️Our new and improved compiler framework 💥SSE hardened mutations 🚀New UI/UX interface 💪Custom obfuscation pass configuration 🔗Register now: https://t.co/ygRr2IlqBb
#reverseengineering
1
8
38
This is a great read for people interested in hypervisor development in both pre-boot and post-boot (Windows) environment, the source is public and written in rust as well. Great work @memn0ps 😀🙌 https://t.co/2grnJgj5hi
https://t.co/Ft32AKrx1P
https://t.co/orsBcoXaPP
memn0ps.github.io
Rusty Hypervisors - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion) and Windows Kernel Blue Pill Type-2 Hypervisor in Rust (Codename: Matrix)
0
37
154
What has BELabs been up to ⁉️ Check out these new SSE based obfuscations. 🫣 We have completely rewritten our compiler from the ground up to pave the way for ARM support. ✅ This has allowed us to make the world's strongest bin2bin obfuscation framework even stronger.💪 The
0
6
49
what is CodeDefender and who is the handsome man in the corner? find out tomorrow when we drop our interview with the @BackEngineerLab team
0
7
71
🚨 How are the geniuses at @BackEngineerLab revolutionizing binary obfuscation with https://t.co/hOe9KDXSTf? Learn about the unique challenges & solutions in bin2bin, virtualization & anti-tamper. See CodeDefender in action with a demo at the end! 👉 https://t.co/ExRwrQDLW1
0
17
57
Given the recent events with VMPSoft DMCA'ing educational YouTube videos demonstrating how to unpack malware protected with VMProtect, we have decided to release a free to use unpacker which works for all versions of VMP 3.x including the most recent version. Simply sign
15
132
621
Today we are announcing 🚢SigBreaker 1.0🚢a binary diversification engine purpose built for breaking static signatures in code while maintaining performance and semantic correctness. https://t.co/ugWv9J6SaX
https://t.co/9nRW3txoCa
codedefender.io
We’re excited to launch SigBreaker 1.0, a purpose-built binary diversification engine designed to disrupt static signature-based detection—without bloating binaries or hurting performance.
1
16
52
We are excited to release our second blog post discussing our technical capabilities of integrating llvm-msvc compiled code into already compiled programs in efforts to build anti-cheats, anti-tamper, packers, import protectors, anti-debug functionality, runtime tracing, and much
codedefender.io
The next generation of software protection.
0
6
38
We are very excited to sponsor @mrexodia with 500$ His open source contributions have made it possible to do what we do. If you have ever benefited from using https://t.co/YRq86b5F6g or other tools developed by @mrexodia consider sponsoring him on github. Special thanks to all of
3
4
42
We have made public a tool called "pdbgen2" which can generate a PDB file for https://t.co/1w9Q5MXSNe obfuscated binaries. The PDB offers function/basic block level granularity. This is very useful for analyzing crash dumps and debugging your obfuscated code in production!
1
16
105
CodeDefender SaaS now provides you with a debug map file format so that you can debug crashes in your binary code. Soon we will update your PDB file (if provided) so you can use it directly in WinDbg and Visual Studio, however this map file format works for PE files provided
0
1
28