Do you happen to know, by any rare chance, any dataset with obfuscated binaries?
Do you happen to know, by any rare chance, any dataset with obfuscated binaries?

Obfuscation is not security – AI can deobfuscate any minified JavaScript code
https://www.afterpack.dev/blog/claude-code-source-leak
#HackerNews #Obfuscation #Security #AI #JavaScript #Deobfuscation
A comprehensive article from #CheckPoint Research
"Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"
https://research.checkpoint.com/2025/generative-ai-for-reverse-engineering/
From the article:
"The use of AI doesn’t eliminate the need for human expertise. XLoader’s most sophisticated protections, such as scattered key derivation logic and multi-layer function encryption, still require manual analysis and targeted adjustments. But the heavy lifting of triage, #deobfuscation, and scripting can now be accelerated dramatically. What once took days can now be compressed into hours."
#ai #aislop #hype #reverse #reverseengineering #reversing #malware #malwareanalysis #mcp
Defeating AuraStealer: Practical Deobfuscation Workflows for Modern Infostealers: https://www.gendigital.com/blog/insights/research/defeating-aurastealer-obfuscation
🚨 Ever tangled with virtual machine-based code protection? 🚨
In 2020, I wrote a virtual machine deobfuscator for a crack me challenge. I've learned a lot doing that challenge and wrote a 2-part series for it:
https://malwareandstuff.com/taming-virtual-machine-based-code-protection-1/
https://malwareandstuff.com/taming-virtual-machine-based-code-protection-2/
🔍 #ReverseEngineering #MalwareAnalysis #windows #idapro #deobfuscation
💣 Full write-up for "Tales for the Brave" - this year's Hard forensics challenge from Hack The Box Cyber Apocalypse CTF - Tales From Eldoria.
🔸 Code #deobfuscation
🔸 hashtag#Telegram data exfiltration
🔸 Malware behavioral analysis
🔗 https://blog.cyberethical.me/htb-ctf-2025-forensics-tales-for-the-brave
#CyberEthical #CyberApocalypse25 #HackTheBox #forensics #EthicalHacking #blueteaming #itsec #dataexfiltration #malware