Create an unreadable binary with these techniques

Whether for malicious purposes, such as the case of malware authors, for corporate purposes, or for other reasons, obfuscation techniques are used to protect a program by making compiled binary static analysis more costly. Obfuscation therefore consists of transforming a

Hardening binaries (II) – PIE

Following the classic compilation options of GCC to try to have more robust binary, in this post we will discuss the options and -fPIE -fpie that allows to compile executable as “Position Independent Executables” and makes their sections to be loaded in random

Hardening binaries (I) – The stack

Among the many options of GCC, some of them are specifically made to make our binaries much more robust against memory corruption techniques. Stack protection techniques try to prevent contiguous blocks of memory, caused by a buffer overflow, which may

Binary palindrome years, the forgotten ones

2015 is a binary palindrome year. If you wonder what does that exactly mean, very simple, if we convert the year from decimal to binary we find that this number is palindrome (11111011111). It is an interesting fact that after realizing of it

PackerInspector

Our sandbox for packers

Categories