<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: AdvDebug</title>
    <description>The latest articles on Forem by AdvDebug (@advdebug).</description>
    <link>https://forem.com/advdebug</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1114305%2Fbe58ded7-805f-408e-91bc-5b19bd1fd9a7.jpg</url>
      <title>Forem: AdvDebug</title>
      <link>https://forem.com/advdebug</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/advdebug"/>
    <language>en</language>
    <item>
      <title>AntiCrack-DotNet: Advanced Methods to prevent cracking.</title>
      <dc:creator>AdvDebug</dc:creator>
      <pubDate>Thu, 05 Dec 2024 12:43:20 +0000</pubDate>
      <link>https://forem.com/advdebug/anticrack-dotnet-advanced-methods-to-prevent-cracking-ed9</link>
      <guid>https://forem.com/advdebug/anticrack-dotnet-advanced-methods-to-prevent-cracking-ed9</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl7r3sx84jrfr7mdnay69.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl7r3sx84jrfr7mdnay69.png" alt="Image description" width="800" height="591"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A .NET Project which Contains some useful techniques to detect debugging and other harmful actions and bypass methods which can be used by crackers to analyze your assembly. (also feel free to open an issue for adding additional anti-debugging features, etc) with syscall support.&lt;/p&gt;

&lt;h2&gt;
  
  
  Anti-Debugging
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;NtUserGetForegroundWindow (looks for bad active window names to check if it's a known debugger)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Debugger.IsAttached&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Hide Threads From Debugger&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;IsDebuggerPresent&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;NtSetDebugFilterState&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Page Guard Breakpoints Detection&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;NtQueryInformationProcess: ProcessDebugFlags, ProcessDebugPort, ProcessDebugObjectHandle&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;NtClose: Invalid Handle, Protected Handle&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Parent Process Checking (Checks if parent are explorer.exe or cmd.exe)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detection of Hardware Breakpoints&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;FindWindow (looks for bad window names)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;GetTickCount&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;OutputDebugString&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Crashing Non-Managed Debuggers with a Debugger Breakpoint&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;OllyDbg Format String Exploit&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Patching DbgUiRemoteBreakin and DbgBreakPoint (Anti-Debugger Attaching)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Anti Virtualization
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Detecting Any.run&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting Triage&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting Qemu.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting Parallels.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting Sandboxie&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting Comodo Container&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting Qihoo360 Sandbox&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting Cuckoo Sandbox&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting VirtualBox and VMware&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting HyperV&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting Emulation&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Checking For Blacklisted Usernames&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting KVM&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting Wine&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Checking For Known Bad VM File Locations&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Checking For Known Bad Process Names&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Checking For Ports on the system (useful if the VM or the sandbox have no ports connected)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Checking for devices created by VMs or Sandboxes&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Anti Dll Injection
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Taking Advantage of Binary Image Signature Mitigation Policy to prevent injecting Non-Microsoft Binaries.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Checking if any injected libraries are present (simple dlls path whitelist check)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Other Detections
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Detecting Most Anti Anti-Debugging Hooking Methods on Common Anti-Debugging Functions by checking for Bad Instructions on Functions Addresses and it detects user-mode anti anti-debuggers like scyllahide, and it can also detect some sandboxes which uses hooking to monitor application behaviour/activity (like Sandboxie/Sandboxie Plus, Hybrid Analysis, Cuckoo Sandbox, and a lot of other online malware analysis websites/applications).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detecting CLR Functions Hooking (like harmony hooks).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>opensource</category>
      <category>security</category>
      <category>csharp</category>
      <category>winapi</category>
    </item>
    <item>
      <title>De4py: Advanced python reverse engineering</title>
      <dc:creator>AdvDebug</dc:creator>
      <pubDate>Sat, 18 May 2024 13:07:07 +0000</pubDate>
      <link>https://forem.com/advdebug/de4py-advanced-python-reverse-engineering-4gj4</link>
      <guid>https://forem.com/advdebug/de4py-advanced-python-reverse-engineering-4gj4</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj0id1xevy3556sinmsm3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj0id1xevy3556sinmsm3.jpg" alt="Image description" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/Fadi002/de4py"&gt;De4py&lt;/a&gt; is an advanced Python deobfuscator with a beautiful user interface and a set of powerful features. It’s designed to help malware analysts and reverse engineers tackle obfuscated Python files and more.&lt;/p&gt;

&lt;p&gt;Here are some key features of De4py:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Deobfuscation: De4py supports popular obfuscators like Jawbreaker, BlankOBF, PlusOBF, Wodx, Hyperion, and pyobfuscate.com obfuscator. It helps you unravel the obfuscated code and understand its true functionality.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Pycode Execution: You can execute Python code directly within the process. This feature is handy when dealing with programs that have licensing checks or other conditional behavior.&lt;br&gt;
Strings Dump: Extract strings from the Python process memory, which can be useful for analyzing webhooks or other data stored in memory.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Removing Exit Function: De4py can remove the exit function, preventing the program from terminating prematurely (useful for debugging).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Getting All Functions: Retrieve a list of all functions within the Python process. Useful for modifying functions in memory.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Pyshell GUI: A custom GUI allows you to execute Python code within the desired process.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;GUI and Console Support: De4py offers both console and GUI modes. The GUI provides a more user-friendly experience.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;File Analyzer: Detects if a Python program is packed (e.g., using pyinstaller) and attempts to unpack it. It also identifies suspicious strings (IPs, websites, specific keywords) within the file.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Behavior Monitoring: Monitors Python processes for file handles, process interactions, memory reads/writes, and socket activity. It can even decrypt OpenSSL-encrypted content.&lt;br&gt;
Plugins System: Customize the theme or add custom deobfuscators using plugins.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;API System: Use De4py’s features (deobfuscator engine and pyshell) in your own tools.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;it's are maintained by my friend Fadi002 and me (AdvDebug), any feedback is appreciated.&lt;/p&gt;

</description>
      <category>malware</category>
      <category>python</category>
      <category>security</category>
      <category>reverseengineering</category>
    </item>
  </channel>
</rss>
