Full Disclosure mailing list archives
.NET Runtime packer PoC
From: Yvan Janssens <ik () yvanj me>
Date: Wed, 23 Oct 2013 15:46:29 +0200
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 I know there is already a huge ecosystem on runtime packer/obfuscators, but for some pesky problem I was required to roll my own to incorporate in a pipeline-like system. Apart from the obvious idiocracy around runtime packing/obfuscating in the .NET/Java world, I put it on Github to provide a starting point for people to learn using high-level constructs how a runtime packer/encryptor works, so people can learn what their common weaknesses are, that they aren't mitigations to R/E and just for reusability. Code quality: crappy/hackerish Supports: .NET 4.0/2.0 URL: https://github.com/friedkiwi/netcrypt ~/y -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.20 (Darwin) Comment: GPGTools - https://gpgtools.org Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQEcBAEBCgAGBQJSZ9M1AAoJEElyT3Tqk/McwFUH/0cI7uYaEJl5dnF6z6YhqzxN ousYILnDTg3vFT8LkmrTCIXMdIiq02Qmds6cwK4eCskFHGt6xeRUgbejewoEcVpr KzdiALOsWw6g1Vq8P+xLWv1ZQor/BNfAAPLFthyztwU4oGMgDBTJM+TR1gZohEyx oJ2KM3SPwXhhPR2sZjHV5jMbjzQg6cYh6t6i1j5IWiffDO4xEKPVChf6wECrGkMu KFJpOTsBZWFIMXcB9avJP6w+fUhuhG+imceu5spzaIkE5KU2LtJwNkmqw+SlehIB +6sjz3j3xFlzVl1zl8t5V26hYqGE6rwThRI3nttWdLS1VQMUgyx8oDAIzK27WPk= =OeZk -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- .NET Runtime packer PoC Yvan Janssens (Oct 24)