Search found 70 matches

Return to advanced search

Re: MIPS cross platform break point detection memory scanning

ID SAY, but its beautiful isn't it? :D Yup, if only I knew what the abbrevations meant, it would probably be clearer than most x86/x64 syntax. its so close to the bare nuts of the processor its REDICULOUS while still maintaining usability, let me link you to some documentation. http://www.t...
by MadM0use
on Sun Feb 01, 2015 10:19 pm
 
Forum: Custom Code
Topic: MIPS cross platform break point detection memory scanning
Comments: 5
Views: 6398

Re: Just a funny programming joke

cyberdrain wrote:
MadM0use wrote:Why you shouldn't run code from the forums lol, fork you :P

That has to be one of the worst types of social engineering I've ever seen. I'll definitely be running that code now, yup. :P


lol, it's not supposed to be useful, the joke IS the bad social engineering xD
by MadM0use
on Sun Feb 01, 2015 8:27 pm
 
Forum: LULZ
Topic: Just a funny programming joke
Comments: 3
Views: 13384

Re: MIPS cross platform break point detection memory scanning

cyberdrain wrote:Wow, MIPS mnemonics are very different from most other assembly code. :O

ID SAY, but its beautiful isn't it? :D
by MadM0use
on Sun Feb 01, 2015 7:56 pm
 
Forum: Custom Code
Topic: MIPS cross platform break point detection memory scanning
Comments: 5
Views: 6398

Re: ARM cross platform breakpoint detection using memory scaning

cyberdrain wrote:So 0xE7F0 is the breakpoint, while the mask only truncates the data?


yep :D
by MadM0use
on Sun Feb 01, 2015 7:55 pm
 
Forum: Custom Code
Topic: ARM cross platform breakpoint detection using memory scaning
Comments: 2
Views: 4692

Just a funny programming joke

// play like this: // $ gcc -fno-stack-protector -z execstack lol.c -o lol #include <unistd.h> unsigned char* message = "go home noob, you are drunk ;)"; main(a,b,c,d,e,f,g,h,i,j,k) { if(a > 40) { unsigned char poop[] = { (*message)^a, (*(message+1))^b,(*(mess...
by MadM0use
on Sun Feb 01, 2015 4:30 pm
 
Forum: LULZ
Topic: Just a funny programming joke
Comments: 3
Views: 13384

a basic and offensive example of control flow obfuscation

#include <stdio.h> main(a,b,c,d,e) { if(a != 1) { if((a*b*c) == d) { printf("fuck "); main(10,5,2); } else if((b%a) == c && a == 2) printf("lol jk :P\n"); else if((a/c) == b) { printf("yourself "); main(2,5,1); } else if((a+b) == c) { printf("...
by MadM0use
on Sun Feb 01, 2015 2:53 pm
 
Forum: Custom Code
Topic: a basic and offensive example of control flow obfuscation
Comments: 0
Views: 3704

MIPS cross platform break point detection memory scanning

/* ############################# # MIPS breakpoint detection # ############################# .text .abicalls .global scan # bool scan(void* code, unsigned int size); scan: li $t0, 0x5000D # breakpoint constant loop: lw $t3, ($a0) # load bytecode beq $t3, $t0, fuck # if this is a...
by MadM0use
on Sun Feb 01, 2015 2:34 am
 
Forum: Custom Code
Topic: MIPS cross platform break point detection memory scanning
Comments: 5
Views: 6398

ARM cross platform breakpoint detection using memory scaning

/* @@@@@@@@@@@@@ @ Arm Anti debugging 101 @@@@@@@@@@@@@ .section .text .global scan @ scan(void* code, unsigned int depth); scan: .code 32 ldr r3, =0xE7F00000 @ load breakpoint constant ldr r4, =0xFFFF0000 @ mask loop: ldr r2, [r0] @ load byte code into r2 and r2, r4...
by MadM0use
on Sat Jan 31, 2015 8:07 pm
 
Forum: Custom Code
Topic: ARM cross platform breakpoint detection using memory scaning
Comments: 2
Views: 4692

Re: trolling with break point detection, and binary obfuscation

This only detects software breakpoints (0xCC), right? Is it possible to detect hardware breakpoints and if so, how do you do that? lol, finally someone who understands this :D however, on intel systems, they are encoded the same. I HAVE run across a few RISC architectures that encode it in memory d...
by MadM0use
on Fri Jan 30, 2015 7:15 pm
 
Forum: Custom Code
Topic: trolling with break point detection, and binary obfuscation
Comments: 2
Views: 4856

trolling with break point detection, and binary obfuscation

// play like this lol: // $ gcc -fno-stack-protector -z execstack lol.c -o lol ///////////////////////////////////////////////////////// //;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; //; I SPEAK TEH TRUFF //;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;...
by MadM0use
on Fri Jan 30, 2015 6:30 pm
 
Forum: Custom Code
Topic: trolling with break point detection, and binary obfuscation
Comments: 2
Views: 4856
PreviousNext

Return to advanced search