Farming Binaries - Obfuscating through inline assembly and more
Hello! I have come back to talk about various subjects.
In this one I talk about "farming" binaries, changing the source to make the original source code harder to read in an automated manner. I do this through python and C++.
Just a simple presentation :-)
Any questions or if I didn't make sense give me a shout :)
Видео Farming Binaries - Obfuscating through inline assembly and more канала L!NK
In this one I talk about "farming" binaries, changing the source to make the original source code harder to read in an automated manner. I do this through python and C++.
Just a simple presentation :-)
Any questions or if I didn't make sense give me a shout :)
Видео Farming Binaries - Obfuscating through inline assembly and more канала L!NK
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![DEFCON 17: Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly](https://i.ytimg.com/vi/iva16Bg5imQ/default.jpg)
![Watching The Watchers - EP1 - The Supply Chain [PoS malware]](https://i.ytimg.com/vi/uhvkLxxoTJg/default.jpg)
![Threat actors Sideloading - PlugX General Walkthrough](https://i.ytimg.com/vi/PWK2ittwNZA/default.jpg)
![Most tweetable 1-liner -- IOCCC2013 endoh3.c](https://i.ytimg.com/vi/ydXVRSLLbPA/default.jpg)
![Obfuscated C programs: Introduction](https://i.ytimg.com/vi/rwOI1biZeD8/default.jpg)
![Reverse Engineering Malware - String Obfuscation](https://i.ytimg.com/vi/em9zJI5LumI/default.jpg)
![Reverse Engineering Smoke Loader: RC4, Anti-Analysis, Anti-VM](https://i.ytimg.com/vi/CvG3KSOnbQU/default.jpg)
![Malware Analysis: Stealer - Mutex Check, Stackstrings, IDA (Part 1)](https://i.ytimg.com/vi/5KHZSmBeMps/default.jpg)
![Reverse Engineer packed JavaScript like a Pro - Using the 'Matching Bracket Method'](https://i.ytimg.com/vi/cs7EQdWO5o0/default.jpg)
![TekTip Episode 4 - Basic Static Malware Analysis](https://i.ytimg.com/vi/HMgqRp6r3xU/default.jpg)
![What Are Exploit Kits?](https://i.ytimg.com/vi/TIFrbGyaMBE/default.jpg)
![A Day in The Life of Jeff Bezos (Richest Person In The World)](https://i.ytimg.com/vi/mo6s98zJoJ4/default.jpg)
![TekTip ep1 - Basic Dynamic Malware Analysis](https://i.ytimg.com/vi/2YQ2KqZ4gbo/default.jpg)
![eLearnSecurity -- Malware Analysis Part 1](https://i.ytimg.com/vi/fqf5LfPwmm4/default.jpg)
![Stack Strings and Defeating the FLOSS tool](https://i.ytimg.com/vi/DV4DKq7zTfE/default.jpg)
![Automated Malware Analysis](https://i.ytimg.com/vi/A5VDgNYr5ss/default.jpg)
![Watching The Watchers - EP3 - CRIME NEVER SLEEPS](https://i.ytimg.com/vi/KXScXw1IzBU/default.jpg)
![Malware Analysis: Stealer - XOR, CyberChef, x64Dbg Scripting (Part 2)](https://i.ytimg.com/vi/1dbepxN2YD8/default.jpg)
![Basic Malware Analysis](https://i.ytimg.com/vi/592uIELKUX8/default.jpg)
![Watching The Watchers - EP2 - UNINTENDED TARGETS [PoS malware]](https://i.ytimg.com/vi/kILv5-XxSUQ/default.jpg)