This course aims to teach learners how to enhance the security of their software by pushing security left through mutating byte code. The goal is to enable developers to write secure code that is resistant to reverse engineering and unauthorized use. The course covers topics such as debugging versions, constant obfuscation, cross-compilation, encryption, memory capture, and key generation. The teaching method involves introducing a new high-level programming language and a compiler to protect existing binaries. This course is intended for software developers and security professionals looking to strengthen the security of their software products.
Overview
Syllabus
Introduction
Agenda
Push Security Left
Debug Version
Constant Obfuscation
Cross Compilation
Binary
Debug
Theory
Encryption
Capture Memory
Testing
Limitations
Key Generation
Website
Questions
Taught by
nullcon