awgh
awgh
@mvdan The definitive paper for control flow obfuscation is this one: http://ac.inf.elte.hu/Vol_030_2009/003.pdf There are several basic techniques described in that paper that should be the initial focus for control flow...
@mvdan OK, for substitutions, it can be a bit more complicated because you need to be somewhat aware of generated assembly and how that assembly will be disassembled. That said,...
Flattening is the only one of these things that requires AST manipulation, the other two are maybe better performed in the code generation phase. If you have to manipulate the...
This turned out to be what was making it impossible for me to use Zap 2.10.0 against OWASP WebGoat/WebWolf running on localhost via HTTP. Zap would redirect to HTTPS and...
This same issue just happened to me with a fresh Ubuntu 17.04 install and a fresh checkout. Bison 3.0.4. This thread is the first thing that pops up when searching...