Posted December 31, 20177 yr Recently lost a bunch of old pdf files and whitepapers I had covering these kinds of topics. Looking for any examples/papers/pdfs etc. that contain things like: Anti-Decompiler Techniques Anti-Debugger Techniques Anti-Disassembler Techniques Mainly looking for native code protection information, not .NET related stuff.
December 31, 20177 yr I can't imagine there is a trick you don't know but I will reference this PDF : http://anti-reversing.com/Downloads/Anti-Reversing/The_Ultimate_Anti-Reversing_Reference.pdf
January 1, 20187 yr Well, @atom0s , I replied on exetools just now but will paste the answer here as well in the hope that it would be useful for anyone else in future as well ... A few links that I find very, very useful for the task at hand, mainly in my own work : This doubles as a tool as well, to check for various anti-debug tricks - Therefore would like to put it at the top of the list. Quote: https://github.com/LordNoteworthy/al-khaser The Ultimate Anti-Debugging Reference by Peter Ferrie - of course one of the classics !OpenRCE Anti Reverse Engineering Techniques Database ....Anti-Unpacker Tricks by Peter Ferrie ... Not to forget the content in our very own ScyllaHide's documentation : Quote: https://bitbucket.org/NtQuery/scyllahide/downloads/ScyllaHide.pdf Of course, @atom0s , in view of the fact that you are also one of the quite senior members here, I have not bothered to give the tons of links that turn up after googling but just gave a couple that I thought would help the most.. Good luck
January 1, 20187 yr Author Thanks guys. I had a fairly large collection of stuff that has turned up missing from a space drive. Trying to rebuild that collection again for personal reading and such for a later time. I had a few specific ones that were C/C++ code examples of some fun tricks that I was looking for but are lost. Seeing if anyone yields those ones but any and all information is welcomed as I enjoy reading/learning more on these topics. Edited January 1, 20187 yr by atom0s
January 4, 20187 yr Albeit not strictly low-level stuff, anything Christian Collberg's group published might be related. His book, Surreptitious Software, does not really get into depth but gives a nice overview of various techniques. Also some public projects come to my mind, obfuscator-llvm for example, which employs techniques such as "chenxification".
Create an account or sign in to comment