#antidebug

2024-11-11

In 2021, I wrote about section hashing, a popular anti debugging technique to detect software breakpoints.
malwareandstuff.com/catching-d

#malware #reverseengineering #cybersecurity #infosec #antidebug

2024-04-18

okay, this is my favorite goofy linux antidebug trick so far. catches gdb and lldb, and especially with a bit more obfuscation (e.g. mmap a *file* RW there, move the stack up a bunch so that it overlaps w/ the mmapped file, write to that file to corrupt your own stack, 😸 ) it can be, i think, pretty annoying to figure out

sprunge.us/J7gMI4

link *statically*
#antidebug #antidebugging

2024-01-28

Came across a reference called "The 'Ultimate' Anti-Debugging Reference" by Peter Ferrie from 2011 yesterday.

Although dated, it contains some of the easiest to understand explanations to many anti-debugging techniques that I've seen so far.

The original link is down, but thankfully it's been archived and I'm a sucker for preservation, so I thought I'd share it here.

web.archive.org/web/2019060812

#windows #antidebug #reference #reverseengineering

2023-02-15
Is there a debugger I can "attach" by sideloading a DLL to the target? #antidebug #antiantidebug
x0rzx0rz
2018-02-19

Rewriting ntdll functions to bypass simple user-mode hooks (antidebug) secrary.com/Random/BypassUserH t.co/8Tvz8KlFm5

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst