02-04-2025, 09:17 PM
Thanks Charles for your offer.
However the main objective of this program "Obfuscator maker.bas" is to
obfuscate a given function's Opcode string into a hex form as shown below
and then to use this hex string in another program. It would make life very difficult for hackers.
Even if they decompile the program, they have limited means to find out what this function
is all about.
Whereas if we were to use ASM, hackers can easily decompile it , view it and able to manipulate
the codes directly in a linear fashion.
To add another layer of complexity we can also encrypt this hex string so that hackers will find
it next to impossible to determine its contents.
We can also split this single hex string into several string components, encrypt these several strings.
And at the time when we needed to run the function, we decrypt these several string components,
then concatenate them into the final Opcode string.
Finally execute CALL DWORD this final opcode string to get the obfuscated function running.
However the main objective of this program "Obfuscator maker.bas" is to
obfuscate a given function's Opcode string into a hex form as shown below
Code:
558BEC535657683F13000083EC70688712200031F656565656568B450C034508034510898568FFFFFFE90A000000EB084678744DF0DE00008B8568FFFFFF8D65F45F5E5B5DC20C0000000000
and then to use this hex string in another program. It would make life very difficult for hackers.
Even if they decompile the program, they have limited means to find out what this function
is all about.
Whereas if we were to use ASM, hackers can easily decompile it , view it and able to manipulate
the codes directly in a linear fashion.
To add another layer of complexity we can also encrypt this hex string so that hackers will find
it next to impossible to determine its contents.
We can also split this single hex string into several string components, encrypt these several strings.
And at the time when we needed to run the function, we decrypt these several string components,
then concatenate them into the final Opcode string.
Finally execute CALL DWORD this final opcode string to get the obfuscated function running.