x86byte Profile Banner
x86byte Profile
x86byte

@x86byte

Followers
107
Following
628
Media
16
Statuses
84

iOS & Windows Vulnerability Researcher & Exploit Developer โ€” Reverse engineer, Obfuscation & De-Obfuscation Practitioner & Compilers Backend ๐Ÿ‘พ๐Ÿฅค

securekernel.exe
Joined September 2022
Don't wanna be here? Send us removal request.
@rohanpaul_ai
Rohan Paul
3 months
LLMs still hallucinate, so the practical goal is to keep every answer tied to verifiable evidence. This survey maps the field and adds a clear taxonomy of metrics, a rollup of proven fixes, and guidance on retrievalโ€‘augmented generation, called RAG, and domain tuning. It frames
17
60
340
@secharvesterx
Security Harvester
3 months
[Apple] Memory Integrity Enforcement: A complete vision for memory safety in Apple devices - Apple Security Research https://t.co/grrKnknb3w
0
1
2
@VeridiseInc
Veridise
4 months
Weโ€™re excited to launch LLZK, an open-source intermediate representation (IR) for zero-knowledge circuits. Think LLVM, but for ZK. Built by @VeridiseInc and supported with a grant from the @ethereumfndn, LLZK is now live on GitHub. Thread ๐Ÿงต 1/4
10
20
104
@BackEngineerLab
Back Engineering Labs
4 months
We have recently released a small side project called "Tether" which explores post-compilation extraction of instructions for exclusive server execution. https://t.co/0viHibG0m4
0
6
25
@pmeerw
Peter Meerwald-Stadler
5 months
yet another MBA paper: asmMBA: Robust Virtualization Obfuscation with Assembly-Based Mixed Boolean-Arithmetic ( https://t.co/Mmw4q8JsYF) unfortuntely, neither the Loki-Blast nor the asmMBA code seems to be available
2
10
45
@BackEngineerLab
Back Engineering Labs
5 months
โ—๏ธ We discovered a bug in Microsoft's driver compliance checks which are used to determine if "Memory Integrity" can be enabled on a system. โŒThe function "vsbapi!HvciIsDriverImage" is comparing an RVA against the raw file size. https://t.co/CoaHNWT3RY
3
6
63
@BackEngineerLab
Back Engineering Labs
5 months
๐Ÿš€ CodeDefender SDK now supports source-level macros! Obfuscate functions in Rust/C/C++ by tagging them with your pre-defined obfuscation profile. ๐Ÿฆ€ #[codedefender("Profile1")] ๐Ÿ’ป CODEDEFENDER("Profile1", ...) Docs + examples ๐Ÿ‘‰ https://t.co/X98IMAioVw #infosec #rustlang
0
5
32
@BackEngineerLab
Back Engineering Labs
5 months
๐Ÿงฐ CodeDefender API and CLI are live Protect binaries from the terminal or Rust SDK Upload โ†’ Analyze โ†’ Obfuscate โ†’ Download YAML configs give full control over passes, symbols, and transform logic ๐Ÿ”— https://t.co/aavdmgdPsW ๐Ÿ“” https://t.co/Jo0Zf6vBGT
0
2
13
@x86byte
x86byte
6 months
RE-MA Roadmap Repository Update The RE-MA Roadmap ( https://t.co/iNo2eWergI) has been updated with new resources. Check it out to explore more materials for mastering reverse engineering and malware analysis! links : - https://t.co/iNo2eWergI - https://t.co/F1TA0ppJdA
0
0
2
@x86byte
x86byte
6 months
#uwu ๐Ÿ‘‰๐Ÿป๐Ÿ‘ˆ๐Ÿป #intelbroker #BreachForums
0
0
1
@x86byte
x86byte
6 months
xD ๐Ÿงƒ๐Ÿ˜‹
0
0
0
@dprkcert
The North Korean Computer Emergency Response Team
6 months
1
1
9
@idkhiddenwtf
idkhidden
6 months
0
2
19
@_xeroxz
IDontCode
4 years
1
2
4
@AzakaSekai_
ๅฎ‰ๅ‚ๆ˜Ÿๆตท Azaka || VTuber
6 months
occasionally I'd get people asking me "how'd you know what this function is/does by just glancing at it?" it's just years of looking at the same thing over and over again
5
9
314
@beffjezos
Beff (e/acc)
6 months
John Carmack Then: Doom programmer Now: Doomslayer
63
217
3K
@x86byte
x86byte
6 months
~"I got a Kernel Panic", xD.
0
0
1
@BackEngineerLab
Back Engineering Labs
6 months
What has BELabs been up to โ‰๏ธ Check out these new SSE based obfuscations. ๐Ÿซฃ We have completely rewritten our compiler from the ground up to pave the way for ARM support. โœ… This has allowed us to make the world's strongest bin2bin obfuscation framework even stronger.๐Ÿ’ช The
0
6
49