Next generation software protection
CodeDefender provides protection against tampering, exploitation, and reverse-engineering, while also ensuring stability, speed, and support for modern Windows security mechanisms.
Services
What can we offer?
Novel Obfuscation
We're pioneering a mathematically robust obfuscation technique that surpasses traditional virtualization methods. Our approach is not only much more performant but also presents formidable challenges to simplification efforts.
Program Hardening
Shield your program from vulnerabilities stemming from memory bugs and thwart potential buffer overflow attacks with our robust detection and prevention measures.
Anti Tamper
Defend against memory inspection and module dumping with our advanced anti-tamper measures. Our solutions encrypt pages, detect API tampering, and prevent byte patching for robust protection.
Binary Diversification
Empower your redteam attack strategy with our cutting-edge binary diversification capabilities. CodeDefender can randomize the binary, thwarting signature detection, while also automatically encrypting data and obfuscating imports for enhanced security.
capabilities
What sets us apart?
Built from the ground up with stability in mind
Unlike other software protectors that are known for breaking programs and requiring manual code marking, we don't.Novel Code Coverage Techniques
Transform functions safely without disrupting their functionality. Our innovative techniques guarantee their preservation.
Full Support For Exception Handling
Our proper exception handling enables seamless use of try/except blocks, eliminating manual marking in your code.
Debug Symbol Support
Competitors leave you stranded when it comes to debugging a crash dump without debug symbol information. We dont!
Windows Security Features
Our binary rewriting framework has support for all modern Windows security features.Control-flow Enforcement Technology (CET)
Most software protectors on the market struggle to support CET, with many sacrificing SEH support. We don't compromise on either.
Control Flow Guard (CFG)
Unlike most other software protectors on the market, we proudly support Control Flow Guard (CFG) to enhance your application's security.
Arbitrary Code Guard (ACG)
Our advanced obfuscation techniques fully support ACG. While we have other techniques that may not offer ACG support, our core methods prioritize compatibility.
Stability at every step.
CodeDefender Roadmap
Step 1: Basic Binary Rewriting
Test and prove our novel binary rewriting techniques. We will start with simple programs to demonstrate and validate the effectiveness of our innovative binary rewriting methods.
Step 2: Full SEH Support (C, C++, etc.)
Extend our framework capabilities to support structured exception handling (SEH) for various languages. We will enhance our framework to include comprehensive SEH rewriting support, covering C, C++, and other languages with specific exception handling mechanisms.
Step 3: Advanced Binary Rewriting
Validate our framework with complex production binaries. Our framework will be tested on some of the most intricate binaries, including Hyper-V, ntoskrnl (Windows kernel), Unity games (e.g., Rust), Unreal Engine games, and Valve games (e.g., CS2, TF2). This step ensures that CodeDefender can handle these complex binaries while maintaining stability.
Step 4: In-house Compiler Development
Continuously improve our in-house obfuscating recompiler, built on B.L.A.R.E. Developing a compiler is an ongoing process. We will continually enhance our in-house compiler to ensure it remains cutting-edge and effective.
Step 5: Recompile Complex Binaries
Demonstrate the stability of our recompiler. We will recompile large, complex binaries, such as Chrome and ntoskrnl, to validate the stability of our recompiler before integrating obfuscation techniques.
Step 6: Implement Novel Obfuscation Techniques
Incorporate a wide range of innovative obfuscation methods. We will implement diverse and advanced obfuscation strategies to further protect binaries from reverse engineering and tampering.
Step 7: Collaborate with Initial Customers
Enhance CodeDefender through real-world feedback. While we have extensively tested CodeDefender on complex and esoteric binaries, working with our initial customers will help us identify and address any real-world issues, ensuring a robust and reliable product.
testimonials
What does the community think?
" Got a chance to check out @BackEngineerLab 's new product demo a couple of days ago. I was very impressed by their stability and performance. I'm unsure if any other bin2bin protectors could bin2bin binaries, such as ntoskrnl or chromium :^) So far looks very promising 👀 "
" Recently, I got to see a tech demo of what @BackEngineerLab has been working on. It's very impressive and a big step forward for stability in code obfuscation software (to the point of being able to rewrite the Windows kernel). Looking forward to seeing the final product! "
" I got a sneak peek at @BackEngineerLab 's latest project! Their demo ran in a bin2bin'd Windows kernel —flawlessly, without any stability issues. For those who know, dealing with exceptions, especially in binary obfuscation is quite a pain. Something to look out for! "
Reach out! We value your feedback!
We need your feedback to improve our product, anything counts!