x86byte
@x86byte
Followers
107
Following
628
Media
16
Statuses
84
iOS & Windows Vulnerability Researcher & Exploit Developer โ Reverse engineer, Obfuscation & De-Obfuscation Practitioner & Compilers Backend ๐พ๐ฅค
securekernel.exe
Joined September 2022
LLMs still hallucinate, so the practical goal is to keep every answer tied to verifiable evidence. This survey maps the field and adds a clear taxonomy of metrics, a rollup of proven fixes, and guidance on retrievalโaugmented generation, called RAG, and domain tuning. It frames
17
60
340
[Apple] Memory Integrity Enforcement: A complete vision for memory safety in Apple devices - Apple Security Research https://t.co/grrKnknb3w
0
1
2
Weโre excited to launch LLZK, an open-source intermediate representation (IR) for zero-knowledge circuits. Think LLVM, but for ZK. Built by @VeridiseInc and supported with a grant from the @ethereumfndn, LLZK is now live on GitHub. Thread ๐งต 1/4
10
20
104
We have recently released a small side project called "Tether" which explores post-compilation extraction of instructions for exclusive server execution. https://t.co/0viHibG0m4
0
6
25
yet another MBA paper: asmMBA: Robust Virtualization Obfuscation with Assembly-Based Mixed Boolean-Arithmetic ( https://t.co/Mmw4q8JsYF) unfortuntely, neither the Loki-Blast nor the asmMBA code seems to be available
2
10
45
โ๏ธ We discovered a bug in Microsoft's driver compliance checks which are used to determine if "Memory Integrity" can be enabled on a system. โThe function "vsbapi!HvciIsDriverImage" is comparing an RVA against the raw file size. https://t.co/CoaHNWT3RY
3
6
63
๐ CodeDefender SDK now supports source-level macros! Obfuscate functions in Rust/C/C++ by tagging them with your pre-defined obfuscation profile. ๐ฆ #[codedefender("Profile1")] ๐ป CODEDEFENDER("Profile1", ...) Docs + examples ๐ https://t.co/X98IMAioVw
#infosec #rustlang
0
5
32
๐งฐ CodeDefender API and CLI are live Protect binaries from the terminal or Rust SDK Upload โ Analyze โ Obfuscate โ Download YAML configs give full control over passes, symbols, and transform logic ๐ https://t.co/aavdmgdPsW ๐ https://t.co/Jo0Zf6vBGT
0
2
13
RE-MA Roadmap Repository Update The RE-MA Roadmap ( https://t.co/iNo2eWergI) has been updated with new resources. Check it out to explore more materials for mastering reverse engineering and malware analysis! links : - https://t.co/iNo2eWergI - https://t.co/F1TA0ppJdA
0
0
2
- #VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture ( https://t.co/tBTYRpLSDv) - #VMProtect 2 - Part Two, Complete Static Analysis ( https://t.co/14d9anBsZ5)
#reverseengineering #virtualisation #Obfuscation
blog.back.engineering
The purpose of this article is to expound upon the prior work disclosed in the last article titled, VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture, as well as correct a few...
0
0
1
occasionally I'd get people asking me "how'd you know what this function is/does by just glancing at it?" it's just years of looking at the same thing over and over again
5
9
314
What has BELabs been up to โ๏ธ Check out these new SSE based obfuscations. ๐ซฃ We have completely rewritten our compiler from the ground up to pave the way for ARM support. โ
This has allowed us to make the world's strongest bin2bin obfuscation framework even stronger.๐ช The
0
6
49
Stealth syscalls (@darkrelaylabs), VM introspection (@memn0ps), Marebackup LPE (@itm4n), Azure Arc C2 (@ZephrFish), and more!
blog.badsectorlabs.com
Stealth syscalls (@darkrelaylabs), VM introspection (@memn0ps), Marebackup LPE (@itm4n), Azure Arc C2 (@ZephrFish), Obfusk8 (@x86byte), and more!
2
10
29