Yu-Jye Tung

@YellowbyteRE

Wannabe Reverse Engineer, interested in automating RE and software (de)obfuscation. Unfortunate Stress Eater, will travel for food if money is not a factor 😭

Cambridge, MA
Vrijeme pridruživanja: rujan 2017.

Tweetovi

Blokirali ste korisnika/cu @YellowbyteRE

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @YellowbyteRE

  1. Prikvačeni tweet
    23. lip 2018.

    Although IDA now has a fix for disassembly desynchronization, the fix inadvertently makes another anti-disassembly technique more stealthy and can also be used to hide instructions. Find out more in this post:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    2. pro 2019.
    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    26. stu 2019.

    What is program synthesis, really? Learn about it by building a synthesizer yourself, following the quick-and-easy tutorial by in today's PL Perspectives post: "Building Your First Program Synthesizer"!

    Poništi
  4. proslijedio/la je Tweet
    Poništi
  5. proslijedio/la je Tweet
    23. stu 2019.

    (More to come, it seems) by Cal (@calvinlikesrice ?)

    Poništi
  6. proslijedio/la je Tweet
    26. lis 2019.

    It's time to share one of my old projects ( about 10 years ago ), implementation of armadillo protectors nanomits technology. Free to use I will share its source code soon... VirusTotal : Download :

    Poništi
  7. proslijedio/la je Tweet
    23. lis 2019.
    Poništi
  8. proslijedio/la je Tweet
    1. lis 2019.

    1.2 is released! The list of new features is so big we split it into multiple blog posts: And why not throw a new website in the mix too? Let us know if you like the new layout:

    New Binary Ninja website masthead
    Poništi
  9. proslijedio/la je Tweet
    5. ruj 2019.

    SATURN -- Software Deobfuscation Framework Based on LLVM ( nice one by )

    Poništi
  10. proslijedio/la je Tweet
    2. ruj 2019.

    [Blog] Obfuscating Java bytecode with LLVM and Epona Melchior de Roquefeuil writes about his 2-month internship at Quarkslab. Thank you Melchior!

    Poništi
  11. proslijedio/la je Tweet
    1. ruj 2019.
    Poništi
  12. proslijedio/la je Tweet
    16. kol 2019.

    Example of IDA+Triton plugin in order to extract opaque predicates where their computation is local to a single basic block using a Forward-Bounded DSE.

    Poništi
  13. proslijedio/la je Tweet
    16. kol 2019.

    "Extended Report on the Obfuscated Integration of Software Protections", by J. Van den Broeck, B. Coppens and Bjorn de Sutter () [July 2019] Code: (extension of Diablo, a link-time binary rewriting framework) Paper:

    Poništi
  14. proslijedio/la je Tweet
    8. kol 2019.

    An antivirus evasion tool from Daniel Sauder () uses multiple techniques to bypass Microsoft Defender software with executable files

    Poništi
  15. proslijedio/la je Tweet
    8. kol 2019.

    [PDF] How to kill Symbolic Deobfuscation for free (Path-Oriented protections)

    Poništi
  16. proslijedio/la je Tweet
    25. srp 2019.

    UniTaint is a PoC for a taint based attack on VMProtect. Traces the vmprotected function with unicorn and taints the input using bea disassembler and a custom tainter

    Poništi
  17. proslijedio/la je Tweet
    23. srp 2019.

    The last article of the series is out. Covering VM-exit handlers, event injection, and a neat way to handle triple faults in a VMM.

    Poništi
  18. proslijedio/la je Tweet
    20. srp 2019.

    Defeating Commercial and Custom Packers like a Pro - VMProtect, ASPack, PECompact, and more:

    Poništi
  19. proslijedio/la je Tweet
    9. srp 2019.

    The DGA of Pitou (Analyzing a Virtualized Algorithm) - great one if you want to learn how a VM based proteciton works

    Poništi
  20. proslijedio/la je Tweet
    1. srp 2019.

    People have requested the slides from my talk at DEF CON China 2019: MODERN MALWARE - OBFUSCATION AND EMULATION; There are few slides about DTrace on Windows. ;)

    Poništi
  21. proslijedio/la je Tweet
    2. lip 2019.

    0pack : A novel technique to hide code from debuggers - An ELF x64 binary payload injector written in c++ : ELF Binary Obfuscation : (pdf)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·