Binary Armory Wiki

A compilation of resources to classical AntiRE techniques I’ve collected over time. Note that some resources may seem to be redundant but are added for the sake of completeness. Feel free to add any if you wish.

Packers/Obfuscators

Build your first LLVM Obfuscator
Extending LLVM for Code Obfuscation 1
Extending LLVM for Code Obfuscation 2
Using LLVM to Obfuscate Your Code During Compilation
Turning Regular Code Into Atrocities With LLVM
Simple Packer in C
Writing a PE packer series
Using UPX as a security packer
How to Write Your Own Packer

Anti-Disassembly

Anti-Disassembly techniques used by malware (a primer) 1
Anti-Disassembly techniques used by malware (a primer) 2
Anti-Disassembly Techniques and Mitigation
Assembly “wrapping”: a technique for anti-disassembly
The Return of Disassembly Desynchronization

Anti-Debug

Anti-Debug Tricks Wiki
[WIN]The Ultimate Anti Debugging Reference
[WIN]Anti-Debugging Techniques and Mitigation
[WIN]Anti Debugging Protection Techniques with Examples
Windows Anti-Debug Reference
Beginner’s Guide to Basic Linux Anti Anti Debugging Technique
Anti-Debug Techniques on Linux

VM/Sandbox Detection

[WIN]Playing with GuLoader Anti-VM techniques
Malware Anti-VM Techniques
Malware Evasion Techniques 2
Malware Evasion Techniques 3
[WIN]Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study
How does malware know the difference between the virtual world and the real world?
[LINUX]Easy Ways to Determine Virtualization Technology

Source Code

https://bitbucket.org/fkie_cd_dare/simplifire.antire/src/master/

Misc

[WIN]Analysis, Anti-Analysis, Anti-Anti-Analysis: An Overview of the Evasive Malware Scenario
Five Anti-Analysis Tricks That Sometimes Fool Analysts
Obfuscation Techniques
Mac OS X Binary Protection
[WIN] Anti Reverse Engineering
Evasion Techniques Wiki
[WIN]Malware Evasion 1
Evasive Techniques: An Introduction
[WIN]Anti–Reverse Engineering Techniques Employed by Malware
Hiding Process Memory Via Anti-Forensic Techniques
Hiding Call To Ptrace
[WIN]Anti-Reverse Engineering Guide
[LINUX]Programming Linux Anti-Reversing Techniques
Malicious cryptography techniques for unreversable (malicious or not) binaries
Malware Armoring: The case against incident related binary analysis

6 Likes

This is a nice compilation , thank you

1 Like

I’m organizing some notes and will try to contribute here when I can. @crimsonRain Do you mind if I send you my bookmarks that I have organized and you can sift through them?

2 Likes

No, I don’t mind. In fact, contributions are welcome, so feel free.

1 Like

This topic was automatically closed after 1654 days. New replies are no longer allowed.