x86byte's profile picture. iOS & Windows Vulnerability Researcher & Exploit Developer — Reverse engineer, Obfuscation & De-Obfuscation Practitioner & Compilers Backend 👾🥤

x86byte

@x86byte

iOS & Windows Vulnerability Researcher & Exploit Developer — Reverse engineer, Obfuscation & De-Obfuscation Practitioner & Compilers Backend 👾🥤

x86byte reposted

LLMs still hallucinate, so the practical goal is to keep every answer tied to verifiable evidence. This survey maps the field and adds a clear taxonomy of metrics, a rollup of proven fixes, and guidance on retrieval‑augmented generation, called RAG, and domain tuning. It frames…

rohanpaul_ai's tweet image. LLMs still hallucinate, so the practical goal is to keep every answer tied to verifiable evidence.

This survey maps the field and adds a clear taxonomy of metrics, a rollup of proven fixes, and guidance on retrieval‑augmented generation, called RAG, and domain tuning.

It frames…

x86byte reposted

[Apple] Memory Integrity Enforcement: A complete vision for memory safety in Apple devices - Apple Security Research security.apple.com/blog/memory-in…

secharvesterx's tweet image. [Apple] Memory Integrity Enforcement: A complete vision for memory safety in Apple devices - Apple Security Research
security.apple.com/blog/memory-in…

x86byte reposted

We’re excited to launch LLZK, an open-source intermediate representation (IR) for zero-knowledge circuits. Think LLVM, but for ZK. Built by @VeridiseInc and supported with a grant from the @ethereumfndn, LLZK is now live on GitHub. Thread 🧵 1/4


x86byte reposted

We have recently released a small side project called "Tether" which explores post-compilation extraction of instructions for exclusive server execution. github.com/codedefender-i…

BackEngineerLab's tweet image. We have recently released a small side project called "Tether" which explores post-compilation extraction of instructions for exclusive server execution. 

github.com/codedefender-i…

x86byte reposted

yet another MBA paper: asmMBA: Robust Virtualization Obfuscation with Assembly-Based Mixed Boolean-Arithmetic (dl.acm.org/doi/pdf/10.114…) unfortuntely, neither the Loki-Blast nor the asmMBA code seems to be available


x86byte reposted

❗️ We discovered a bug in Microsoft's driver compliance checks which are used to determine if "Memory Integrity" can be enabled on a system. ❌The function "vsbapi!HvciIsDriverImage" is comparing an RVA against the raw file size. learn.microsoft.com/en-us/answers/…

BackEngineerLab's tweet image. ❗️ We discovered a bug in Microsoft's driver compliance checks which are used to determine if "Memory Integrity" can be enabled on a system. 

❌The function "vsbapi!HvciIsDriverImage" is comparing an RVA against the raw file size.

learn.microsoft.com/en-us/answers/…
BackEngineerLab's tweet image. ❗️ We discovered a bug in Microsoft's driver compliance checks which are used to determine if "Memory Integrity" can be enabled on a system. 

❌The function "vsbapi!HvciIsDriverImage" is comparing an RVA against the raw file size.

learn.microsoft.com/en-us/answers/…

x86byte reposted

🚀 CodeDefender SDK now supports source-level macros! Obfuscate functions in Rust/C/C++ by tagging them with your pre-defined obfuscation profile. 🦀 #[codedefender("Profile1")] 💻 CODEDEFENDER("Profile1", ...) Docs + examples 👉 github.com/codedefender-i… #infosec #rustlang

BackEngineerLab's tweet image. 🚀 CodeDefender SDK now supports source-level macros!

Obfuscate functions in Rust/C/C++ by tagging them with your pre-defined obfuscation profile.

🦀 #[codedefender("Profile1")]
💻 CODEDEFENDER("Profile1", ...)

Docs + examples 👉 github.com/codedefender-i…

#infosec #rustlang…

x86byte reposted

🧰 CodeDefender API and CLI are live Protect binaries from the terminal or Rust SDK Upload → Analyze → Obfuscate → Download YAML configs give full control over passes, symbols, and transform logic 🔗 github.com/codedefender-i… 📔 docs.codedefender.io/features/api

BackEngineerLab's tweet image. 🧰 CodeDefender API and CLI are live

Protect binaries from the terminal or Rust SDK

Upload → Analyze → Obfuscate → Download

YAML configs give full control over passes, symbols, and transform logic

🔗 github.com/codedefender-i…
📔  docs.codedefender.io/features/api

RE-MA Roadmap Repository Update The RE-MA Roadmap (github.com/x86byte/RE-MA-…) has been updated with new resources. Check it out to explore more materials for mastering reverse engineering and malware analysis! links : - - x86byte.github.io/x86byte_kpwn/a…

x86byte's tweet image. RE-MA Roadmap Repository Update
The RE-MA Roadmap (github.com/x86byte/RE-MA-…) has been updated with new resources. Check it out to explore more materials for mastering reverse engineering and malware analysis!

links :
- 

- x86byte.github.io/x86byte_kpwn/a…

- #VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture (blog.back.engineering/17/05/2021/) - #VMProtect 2 - Part Two, Complete Static Analysis (blog.back.engineering/21/06/2021/) #reverseengineering #virtualisation #Obfuscation


xD 🧃😋

x86byte's tweet image. xD 🧃😋

x86byte reposted
idkhiddenwtf's tweet image.

x86byte reposted
_xeroxz's tweet image.

x86byte reposted

occasionally I'd get people asking me "how'd you know what this function is/does by just glancing at it?" it's just years of looking at the same thing over and over again

AzakaSekai_'s tweet image. occasionally I'd get people asking me "how'd you know what this function is/does by just glancing at it?" it's just years of looking at the same thing over and over again

x86byte reposted

John Carmack Then: Doom programmer Now: Doomslayer

beffjezos's tweet image. John Carmack

Then: Doom programmer      Now: Doomslayer
beffjezos's tweet image. John Carmack

Then: Doom programmer      Now: Doomslayer

~"I got a Kernel Panic", xD.

x86byte's tweet image. ~"I got a Kernel Panic", xD.
x86byte's tweet image. ~"I got a Kernel Panic", xD.

x86byte reposted

What has BELabs been up to ⁉️ Check out these new SSE based obfuscations. 🫣 We have completely rewritten our compiler from the ground up to pave the way for ARM support. ✅ This has allowed us to make the world's strongest bin2bin obfuscation framework even stronger.💪 The…

BackEngineerLab's tweet image. What has BELabs been up to ⁉️ 
Check out these new SSE based obfuscations. 🫣
We have completely rewritten our compiler from the ground up to pave the way for ARM support. ✅ 

This has allowed us to make the world's strongest bin2bin obfuscation framework even stronger.💪
The…

United States Trends

Loading...

Something went wrong.


Something went wrong.