Deobfuscation techniques: Peephole deobfuscation
In this article we describe a basic deobfuscation technique by leveraging a code snippet substitution.
My new post about #malware #deobfuscation - cert.pl/en/posts/202.... I focus on the simple - but powerful - technique of local substitutions. Uses #ghidra and ghidralib. Thx @nazywam.bsky.social for the review.
24.04.2025 13:22 β π 2 π 1 π¬ 0 π 0
Ghidralib development continues: py3 support, binary/asm patching, and symbolic propagation: github.com/msm-code/ghi.... I also write docs for people who want to try it. Newest chapter: emulation msm-code.github.io/ghidralib/em...
#ghidra #reverseengineering
06.01.2025 03:25 β π 0 π 0 π¬ 0 π 0
A image that shows a piece of code. On top there is an expression (param_1 & 1) * 2 + (param_1 ^ 1). On the bottom is a deobfuscated version, param_1 + 1. In the middle there is a custom Ghidra DSL, explained in the post.
RULECOMPILE - Undocumented Ghidra decompiler rule language.
A blog post about how frustration with poor decompilation led me to dive deep into Ghidra's decompiler to discover (and reverse-engineer) - an obscure, undocumented DSL
msm.lt/re/ghidra/ru...
#reverseengineering #ghidra
30.12.2024 19:34 β π 14 π 9 π¬ 0 π 0
A dragon logo, with two pieces of code. On the left there is "turn this", with a long snippet of pure ghidra code. On the right there is "into this", with a single line of ghidralib.
πExcited to announce ghidralib β a library that makes #Ghidra scripts drastically shorter and easier to write. I've been using it daily for #reverseengineering and decided itβs time to share!
Check it out: github.com/msm-code/ghi.... And the documentation: msm-code.github.io/ghidralib/.
#infosec #re
23.12.2024 22:36 β π 8 π 0 π¬ 0 π 0
A VS screenshot with colored python bytecode opcodes.
Just open-sourced another small OS #ReverseEngineering project: a tiny extension for highlighting Python bytecode using #VsCode.
github.com/msm-code/vsc...
It also serves as a good demo of how to create such plugins (spoiler: it's very, very easy).
#reversing #infosec
12.12.2024 16:53 β π 1 π 0 π¬ 0 π 0
Hi Bluesky. I created a #Ghidra quick search/command palette/launcher plugin called "Ctrl+P". You can search functions, labels, data, bookmarks, focus windows, launch scripts and trigger available action. All in a single Python file.
github.com/msm-code/Ghi...
#reversing #reverseengineering #infosec
01.12.2024 01:29 β π 6 π 1 π¬ 0 π 0
The largest collection of malware source code, samples, and papers on the internet.
Password: infected
(unofficial, this is a bot! Maintained by @yjb.bsky.social, the bot can't handle retweets, video, and maybe a few other things)
Reverse engineer, file formats expert.β¨Corkami, CPS2Shock, PoC||GTFO, Sha1tered, Magika...β¨Security engineer @ Google. He/him.
Advanced Practices π¦
@Google Threat Intelligence Group
Threat Attribution, Frontline Intelligence, Malware Analysis, Threat Hunting, Incident Response
#attributionmatters
Security researcher/programmer β Managing director @ HexArcana β @DragonSectorCTF founder β he/him
security enthusiast that loves hunting for bugs in the wild. co-founder and player of @justCatTheFish.
infosec at @google. opinions are mine.
From: https://twitter.com/terjanq
Substack: http://lcamtuf.substack.com/archive
Homepage: http://lcamtuf.coredump.cx
Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc) ; https://hasherezade.net
Follow us for the latest blogs and IOCs from Team Cymru's S2 Threat Research team.
Security research and breaking news straight from ESET Research Labs.
welivesecurity.com/research/
Military-grade reverse engineer @ Google, working on Android malware
Got mistaken for a member of Project Zero once.
Everything here is my own opinion
he/him β¨ππ¦
Security research @cert.pl