belabs_engineer

91 posts

belabs_engineer banner
belabs_engineer

belabs_engineer

@belabs_engineer

Interested in anything (de)obfuscation related.

Katılım Kasım 2024
60 Takip Edilen116 Takipçiler
belabs_engineer retweetledi
Invoke RE
Invoke RE@InvokeReversing·
We've uploaded our live stream from RE//verse 2026 where we sat down with @emesarecom from @vector35 to discuss WARP signatures used for symbol and type information recovery. Mason is a wealth of knowledge and it was a pleasure speaking with him at this amazing event!
Invoke RE tweet media
English
1
8
29
2K
LaurieWired
LaurieWired@lauriewired·
well...not quite along those lines, but I really enjoyed this one talk that started out by reverse engineering VMProtect, pointing out the weaknesses, and then made their own cool obfuscator with some advanced techniques! The talk isn’t quite up yet (too new), but they released the code here: github.com/codedefender-i…
English
3
0
19
2K
LaurieWired
LaurieWired@lauriewired·
RE//Verse was genuinely one of the best technical conferences I’ve attended (and I’ve been to a lot!). The caliber of the attendees was super high; one of the most technical audiences I’ve ever spoken to. It was well organized, highly caring staff, not to mention the food was really good! Giving the keynote was fun, and I really enjoyed all the other talks as well.
LaurieWired tweet mediaLaurieWired tweet media
English
11
15
466
30.1K
Nic Barker
Nic Barker@nicbarkeragain·
just got bitten by an absolutely classic C/C++ bug, can you see what it is?
Nic Barker tweet media
English
73
5
364
82.7K
belabs_engineer retweetledi
smartest tech takes
smartest tech takes@smarttechtakes·
true?
smartest tech takes tweet media
English
37
117
3.2K
100.9K
belabs_engineer retweetledi
GuidedHacking
GuidedHacking@GuidedHacking·
ZXX
0
7
139
7.9K
Lab
Lab@LabGuy94·
Vulnerable driver only returns bottom 32 bits of 64 bit virtual address, ended up brute forcing the top 32 bits
Lab tweet media
English
1
3
31
1.8K
belabs_engineer retweetledi
RE//verse
RE//verse@REverseConf·
Reverse engineers, this is your conference. RE//verse kicks off in Orlando this March! Console and Xbox hacking, firmware targets, real world anti RE, and many talks you won't want to miss. Tickets are limited and selling fast, so grab yours before they are gone: shop.binary.ninja/collections/re…
RE//verse tweet media
English
0
5
32
4.9K
belabs_engineer retweetledi
RE//verse
RE//verse@REverseConf·
Laurie (@lauriewired) is keynoting RE//verse 2026 with Thinking Like a Compiler: Obfuscation from the Other Side! From LLVM passes baked into the build to custom VM bytecode that leaves decompilers guessing, this one goes straight for the toolchain. Get your ticket asap: shop.binary.ninja/collections/re…
RE//verse tweet media
English
2
18
213
50.4K
belabs_engineer retweetledi
RE//verse
RE//verse@REverseConf·
Catch this talk at RE//verse 2026. Xusheng Li walks through breaking encrypted USB drives with time travel debugging and shows how TTD in Binary Ninja makes it simple to spot “encrypted” drives with no real encryption, client side password handling and broken crypto. Tickets on sale here: shop.binary.ninja/collections/re…
RE//verse tweet media
English
0
5
24
1.5K
belabs_engineer retweetledi
RE//verse
RE//verse@REverseConf·
Carl Svensson (@zetatwo) is bringing Age of Empires II Definitive Edition to RE//verse 2026 as a playground for tooling. This talk walks through Binary Ninja automation to decrypt and deobfuscate game code and a BNIL query system for matching obfuscated instruction patterns. If you like game reversing you will want to see this talk: shop.binary.ninja/collections/re…
RE//verse tweet media
English
1
5
28
2.5K
belabs_engineer retweetledi
RE//verse
RE//verse@REverseConf·
Bas Zweers (@belabs_engineer) and James McGowan (@backengineerlab) bring a look at a real world commercial binary obfuscator to RE//verse 2026. This talk walks through analysis and custom tooling to peel back obfuscation on Windows kernel mode anti cheat and ends with a full taxonomy of its tricks. Get your ticket: shop.binary.ninja/collections/re…
RE//verse tweet media
English
0
12
47
5K
belabs_engineer retweetledi
LaurieWired
LaurieWired@lauriewired·
of course, this code is complete AI slop. Right off the bat, headers aren’t passed for POST/PUT/DELETE. Both the help and -v options flat out lie about what was sent. Literally half of the flags are no-ops. Oh, and it just silently drops authentication, so that’s fun. But somehow your “99 fuzz harnesses” didn’t catch that.
English
302
469
10.3K
1.2M
belabs_engineer
belabs_engineer@belabs_engineer·
@vector35 Are there any emproof sample binaries available other than the demo website.
English
1
0
3
120
Vector 35
Vector 35@vector35·
Join us for another interview this Friday at 4pm ET with Tim Blazytko! As the instructor of Software Deobfuscation Techniques at RE//verse 2026, we'll be picking his brain about the role obfuscation and deobfuscation play a role in today's cybersecurity scene. What would you like to know? Reply with your questions! youtube.com/live/GQtX7S_oX…
YouTube video
YouTube
Vector 35 tweet media
English
3
7
26
9.9K
belabs_engineer
belabs_engineer@belabs_engineer·
@nickeverdox Wonder if cheat vendors are going to start requiring users to disable ermsb and fsrm in the BIOS 🤣
English
0
0
0
797
Nick Peterson 🇺🇲 ✝️
Nick Peterson 🇺🇲 ✝️@nickeverdox·
Close to 10 years ago when researching different mechanisms of detecting hypervisor introspection via EPT, x-only in particular, I fumbled upon the ERMSB "side channel" :) Seems other folks have figured it out, so worth sharing. github.com/everdox/ermsb-…
English
5
18
89
32.1K
belabs_engineer retweetledi
Struth
Struth@StruthGaming·
I've irreparably harmed my brain watching so many Call of Shame videos to research and debunk this absolute clown. Mainly covering the "Peer reviewed", "PHD-level" white paper and how the Guardian Truesight anti-cheat actually works (or how it doesn't work?). YT - youtu.be/wLaQ6BlC9Gg?si…
YouTube video
YouTube
Struth tweet media
English
37
32
455
136.2K
belabs_engineer
belabs_engineer@belabs_engineer·
@emojibakemono @chompie1337 And yes in an ideal world we would minimize the amount of privileged code as much as possible. Sadly it is not realistic for an anticheat to be constrained to usermode in the current competitive landscape.
English
0
0
0
76
belabs_engineer
belabs_engineer@belabs_engineer·
@emojibakemono @chompie1337 The genshin impact driver required administrator privileges to load, microsoft doesn't even acknowledge administrator -> kernel as a security boundary. The difference with vanguard would be that it is an early boot driver so it does not have to be loaded manually.
English
1
0
0
99
chompie
chompie@chompie1337·
*sigh* is it time for this meme again
chompie tweet media
GamerDoc@ItsGamerDoc

I’m not trying to come across as dismissive, but it seems like there’s a gap in understanding the technical complexities of the issues you’re talking about in your videos. This applies to both you and @PirateSoftware as well lately It’s easy to comment broadly, but diving into the specifics of anti-cheat systems and their role in gaming requires a deeper look at the problem space. anti-cheat drivers aren’t implemented just for the lols. They’re designed to tackle sophisticated threats like kdmappers, VBS implant cheats, DMA cheats, EFI bootkit cheats, and the increasingly a new threat surface SMM cheats. These are real, evolving attack vectors that can undermine the integrity of competitive gaming ecosystems. If you’re skeptical about anti-cheats, that’s fair, but dismissing them without understanding their purpose overlooks the technical challenges they address. Instead of focusing frustration on game companies, consider redirecting that energy toward issues like OEM vendors shipping RGB lighting drivers with vulnerabilities that allow read/write memory access often pre installed on your machine. These are far more exploitable and widespread than many realize. Game companies have a legitimate interest in protecting their games and ensuring a fair competitive environment. While it’s okay to disagree, it’s important to recognize that these attack vectors exist and won’t be mitigated without proactive measures from anti-cheat teams. Dismissing their efforts doesn’t negate the real threats they’re combating.

English
13
54
1.2K
46.9K