Do you happen to know, by any rare chance, any dataset with obfuscated binaries?

#reverseengineering #obfuscation #deobfuscation

La reverseuse LaurieWired pour illustrer la compromission d'une machine via #​fuzzing et #Deobfuscation de #binaire https://www.youtube.com/watch?v=ek3FEJl1AY8
Hack The Box - Json - à la Toison d'or

YouTube

Obfuscation is not security – AI can deobfuscate any minified JavaScript code

https://www.afterpack.dev/blog/claude-code-source-leak

#HackerNews #Obfuscation #Security #AI #JavaScript #Deobfuscation

Claude Code's Source Didn't Leak. It Was Already Public for Years.

Everyone's calling it a source code leak. But Claude Code's entire CLI was already on npm, in plaintext, readable by anyone. The source map just added comments on top.

A comprehensive article from #CheckPoint Research

"Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"

https://research.checkpoint.com/2025/generative-ai-for-reverse-engineering/

From the article:
"The use of AI doesn’t eliminate the need for human expertise. XLoader’s most sophisticated protections, such as scattered key derivation logic and multi-layer function encryption, still require manual analysis and targeted adjustments. But the heavy lifting of triage, #deobfuscation, and scripting can now be accelerated dramatically. What once took days can now be compressed into hours."

#ai #aislop #hype #reverse #reverseengineering #reversing #malware #malwareanalysis #mcp

Leveraging Generative AI to Reverse Engineer XLoader

Check Point Research succeeded in understanding the infamous malware family, Xloader, by leveraging Generative AI

Check Point Research

Defeating AuraStealer: Practical Deobfuscation Workflows for Modern Infostealers: https://www.gendigital.com/blog/insights/research/defeating-aurastealer-obfuscation

#infostealer #analysis #deobfuscation

Defeating AuraStealer: Practical Deobfuscation Workflows for Modern Infostealers

A technical walkthrough of obfuscation, anti-analysis and data theft capabilities

🚨 Ever tangled with virtual machine-based code protection? 🚨

In 2020, I wrote a virtual machine deobfuscator for a crack me challenge. I've learned a lot doing that challenge and wrote a 2-part series for it:

https://malwareandstuff.com/taming-virtual-machine-based-code-protection-1/

https://malwareandstuff.com/taming-virtual-machine-based-code-protection-2/

🔍 #ReverseEngineering #MalwareAnalysis #windows #idapro #deobfuscation

Taming Virtual Machine Based Code Protection – 1

Overcoming obfuscation in binaries has always been an interesting topic for me, especially in combination with malware. Over the last weeks I’ve been playing around with Virtualised Code Prot…

Malware and Stuff
My new post about #malware #deobfuscation - https://cert.pl/en/posts/2025/04/peephole-deobfuscation/. I focus on the simple - but powerful - technique of local substitutions. Uses #ghidra and ghidralib.
Deobfuscation techniques: Peephole deobfuscation

In this article we describe a basic deobfuscation technique by leveraging a code snippet substitution.

💣 Full write-up for "Tales for the Brave" - this year's Hard forensics challenge from Hack The Box Cyber Apocalypse CTF - Tales From Eldoria.

🔸 Code #deobfuscation
🔸 hashtag#Telegram data exfiltration
🔸 Malware behavioral analysis

🔗 https://blog.cyberethical.me/htb-ctf-2025-forensics-tales-for-the-brave

#CyberEthical #CyberApocalypse25 #HackTheBox #forensics #EthicalHacking #blueteaming #itsec #dataexfiltration #malware

🎩 Oh, look! Another tool to "deobfuscate" strings from garbled binaries, because obviously your life was incomplete without it. 🙄 Google Cloud wants you to believe it's revolutionary, but really, it's just another way to make you feel guilty for not understanding #Kubernetes. 😂
https://cloud.google.com/blog/topics/threat-intelligence/gostringungarbler-deobfuscating-strings-in-garbled-binaries #deobfuscation #GoogleCloud #techhumor #binarytools #developerlife #HackerNews #ngated
GoStringUngarbler: Deobfuscating Strings in Garbled Binaries | Google Cloud Blog

We discuss how threat actors protect malware with garble obfuscation, and the process of automatically deobfuscating it.

Google Cloud Blog
GoStringUngarbler: Deobfuscating Strings in Garbled Binaries | Google Cloud Blog

We discuss how threat actors protect malware with garble obfuscation, and the process of automatically deobfuscating it.

Google Cloud Blog