Next generation software protection

CodeDefender provides protection against tampering, exploitation, and reverse-engineering, while also ensuring stability, speed, and support for modern Windows security mechanisms.

Our Philosophy: Stability is number one. What is the point of using a software protector if it breaks your program?

Services

What can we offer?

Novel Obfuscation

We're pioneering a mathematically robust obfuscation technique that surpasses traditional virtualization methods. Our approach is not only much more performant but also presents formidable challenges to simplification efforts.

Program Hardening

Shield your program from vulnerabilities stemming from memory bugs and thwart potential buffer overflow attacks with our robust detection and prevention measures.

Anti Tamper

Defend against memory inspection and module dumping with our advanced anti-tamper measures. Our solutions encrypt pages, detect API tampering, and prevent byte patching for robust protection.

Binary Diversification

Empower your redteam attack strategy with our cutting-edge binary diversification capabilities. CodeDefender can randomize the binary, thwarting signature detection, while also automatically encrypting data and obfuscating imports for enhanced security.

capabilities

What sets us apart?

Built from the ground up with stability in mind

Unlike other software protectors that are known for breaking programs and requiring manual code marking, we don't.

Novel Code Coverage Techniques

Transform functions safely without disrupting their functionality. Our innovative techniques guarantee their preservation.

Full Support For Exception Handling

Our proper exception handling enables seamless use of try/except blocks, eliminating manual marking in your code.

Debug Symbol Support

Competitors leave you stranded when it comes to debugging a crash dump without debug symbol information. We dont!

Windows Security Features

Our binary rewriting framework has support for all modern Windows security features.

Control-flow Enforcement Technology (CET)

Most software protectors on the market struggle to support CET, with many sacrificing SEH support. We don't compromise on either.

Control Flow Guard (CFG)

Unlike most other software protectors on the market, we proudly support Control Flow Guard (CFG) to enhance your application's security.

Arbitrary Code Guard (ACG)

Our advanced obfuscation techniques fully support ACG. While we have other techniques that may not offer ACG support, our core methods prioritize compatibility.

Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1
Image 1

Stability at every step.

CodeDefender Roadmap

Step 1: Basic Binary Rewriting

Test and prove our novel binary rewriting techniques. We will start with simple programs to demonstrate and validate the effectiveness of our innovative binary rewriting methods.

Step 2: Full SEH Support (C, C++, etc.)

Extend our framework capabilities to support structured exception handling (SEH) for various languages. We will enhance our framework to include comprehensive SEH rewriting support, covering C, C++, and other languages with specific exception handling mechanisms.

Step 3: Advanced Binary Rewriting

Validate our framework with complex production binaries. Our framework will be tested on some of the most intricate binaries, including Hyper-V, ntoskrnl (Windows kernel), Unity games (e.g., Rust), Unreal Engine games, and Valve games (e.g., CS2, TF2). This step ensures that CodeDefender can handle these complex binaries while maintaining stability.

Step 4: In-house Compiler Development

Continuously improve our in-house obfuscating recompiler, built on B.L.A.R.E. Developing a compiler is an ongoing process. We will continually enhance our in-house compiler to ensure it remains cutting-edge and effective.

Step 5: Recompile Complex Binaries

Demonstrate the stability of our recompiler. We will recompile large, complex binaries, such as Chrome and ntoskrnl, to validate the stability of our recompiler before integrating obfuscation techniques.

Step 6: Implement Novel Obfuscation Techniques

Incorporate a wide range of innovative obfuscation methods. We will implement diverse and advanced obfuscation strategies to further protect binaries from reverse engineering and tampering.

Step 7: Collaborate with Initial Customers

Enhance CodeDefender through real-world feedback. While we have extensively tested CodeDefender on complex and esoteric binaries, working with our initial customers will help us identify and address any real-world issues, ensuring a robust and reliable product.

testimonials

What does the community think?

" Got a chance to check out @BackEngineerLab 's new product demo a couple of days ago. I was very impressed by their stability and performance. I'm unsure if any other bin2bin protectors could bin2bin binaries, such as ntoskrnl or chromium :^) So far looks very promising 👀 "


" Recently, I got to see a tech demo of what @BackEngineerLab has been working on. It's very impressive and a big step forward for stability in code obfuscation software (to the point of being able to rewrite the Windows kernel). Looking forward to seeing the final product! "


" I got a sneak peek at @BackEngineerLab 's latest project! Their demo ran in a bin2bin'd Windows kernel —flawlessly, without any stability issues. For those who know, dealing with exceptions, especially in binary obfuscation is quite a pain. Something to look out for! "


Reach out! We value your feedback!

We need your feedback to improve our product, anything counts!