Full Disclosure mailing list archives

.NET Runtime packer PoC


From: Yvan Janssens <ik () yvanj me>
Date: Wed, 23 Oct 2013 15:46:29 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

I know there is already a huge ecosystem on runtime
packer/obfuscators, but for some pesky problem I was required to roll
my own to incorporate in a pipeline-like system.

Apart from the obvious idiocracy around runtime packing/obfuscating in
the .NET/Java world, I put it on Github to provide a starting point
for people to learn using high-level constructs how a runtime
packer/encryptor works, so people can learn what their common
weaknesses are, that they aren't mitigations to R/E and just for
reusability.

Code quality: crappy/hackerish
Supports: .NET 4.0/2.0
URL: https://github.com/friedkiwi/netcrypt

~/y
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.20 (Darwin)
Comment: GPGTools - https://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBCgAGBQJSZ9M1AAoJEElyT3Tqk/McwFUH/0cI7uYaEJl5dnF6z6YhqzxN
ousYILnDTg3vFT8LkmrTCIXMdIiq02Qmds6cwK4eCskFHGt6xeRUgbejewoEcVpr
KzdiALOsWw6g1Vq8P+xLWv1ZQor/BNfAAPLFthyztwU4oGMgDBTJM+TR1gZohEyx
oJ2KM3SPwXhhPR2sZjHV5jMbjzQg6cYh6t6i1j5IWiffDO4xEKPVChf6wECrGkMu
KFJpOTsBZWFIMXcB9avJP6w+fUhuhG+imceu5spzaIkE5KU2LtJwNkmqw+SlehIB
+6sjz3j3xFlzVl1zl8t5V26hYqGE6rwThRI3nttWdLS1VQMUgyx8oDAIzK27WPk=
=OeZk
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: