logo
I would avoid obfuscation for the most part and stick with checksums. You put checksums and verification steps at different places in your code.
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used ...
Feb 10, 2025 — Obfuscation is all about making code look confusing and messy on purpose. Hackers use it to hide malicious code from antivirus programs.
Mar 3, 2020 — A simple and automated obfuscation tool compatible with Windows, so I thought I would give it a test run and blog about it.
Mar 7, 2018 — Proofpoint researchers have discovered a previously undocumented remote access Trojan (RAT) called FlawedAmmyy that has been used since the beginning of 2016.
Jul 26, 2022 — Named 'Luca Stealer' by Cyble Research Labs, this Rust-based malware targets Chromium-based browsers, including Microsoft Edge and Google Chrome ...Read more
Sep 7, 2023 — This Python malware is a complex threat in the world of cyber threats. It goes to great lengths to hide its tracks, disable security measures, and exfiltrate a ...
Jul 29, 2022 — Written in the Rust programming language, Luca Stealer aids threat actors in targeting several versions of the Windows OS. The researchers who ...Read more
Dec 30, 2020 — This is probably code that loads malicious dlls into memory. typedef BOOL (WINAPI *VirtualFreeT)( __in LPVOID lpAddress, __in SIZE_T dwSize, __ ...
Obfuscated files or information empower adversaries to perform malicious actions that would be trivial to prevent, detect, or mitigate.
When it comes to scripting languages, their interpretive nature allows malware authors to obfuscate the script directly at the source code level ...
Since .NET programs can be easily decompiled into something very close to their source codes, many developers (and malware authors) use all sorts of obfuscation ...
Sep 4, 2018 — Programmers may deliberately obfuscate code to conceal its purpose (security through obscurity) or its logic or implicit values embedded in it, ...
Aug 6, 2024 — Top 7 Source Code Obfuscation Techniques · 1. Data Transformation · 2. Code Flow Obfuscation · 3. Address Obfuscation · 4. Regular Renewal of ...
WordPress Doctor Malware Scan plugin scans your company's WordPress files from the inside using our database of over 10,000 virus detection pattern definitions ...Read more
Jul 23, 2020 — Obfuscation is the most commonly used technique to conceal the original code written by the programmer, rendering the executable code difficult ...
This code provides a practical demonstration of various code obfuscation techniques and their impact on code analysis and reverse engineering.
Mar 5, 2024 — To set up our obfuscation toolchain, we need to complete five (5) steps: Install LLVM/Clang from the system repository; Use xwin to download and ...