Skip to content

Commit 881d69b

Browse files
committed
README update.
1 parent 6499325 commit 881d69b

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

README.md

+4
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ This tool is a machine code de-optimizer. By transforming/mutating the machine c
3838
Bypassing security products is a very important part of many offensive security engagements. The majority of the current AV evasion techniques used in various different evasion tools, such as packers, shellcode encoders, and obfuscators, are dependent on the use of self-modifying code running on RWE memory regions. Considering the current state of security products, such evasion attempts are easily detected by memory analysis tools such as [Moneta](https://github.com/forrest-orr/moneta) and [Pe-sieve](https://github.com/hasherezade/pe-sieve). This project introduces a new approach to code obfuscation with the use of machine code de-optimization. It uses certain mathematical approaches, such as arithmetic partitioning, logical inverse, polynomial transformation, and logical partitioning, for transforming/mutating the instructions of the target binary without creating any recognizable patterns. The tool is capable of transforming the instructions of a given binary up to ~95% by using the mentioned de-optimization tricks.
3939

4040
**Watch the presentation for more...**
41+
- [Why So Optimized? - Insomni'hack 2024](https://youtu.be/Issvbst_89I?feature=shared)
4142

4243
## Installation
4344

@@ -60,6 +61,9 @@ docker run -it egee/deoptimizer -h
6061

6162
## Usage
6263

64+
> [!WARNING]
65+
> This project is still in the development stage! The available transform gadgets, functions, and command line parameter names may be adjusted, backward compatibility is not guaranteed.
66+
6367
```
6468
Machine code deoptimizer.
6569

0 commit comments

Comments
 (0)