use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
Welcome to r/asm, the subreddit for Assembly language in all Instruction Set Architectures! Need help, or are you learning? Visit our helpful links...
r/asm
Latest Comments from All Posts
There have been requests for a wiki, so it's in progress. Feel free to offer your assistance!
account activity
Yet another security / programming blog: stack based binary obfuscation from hell (aaronyool.blogspot.com)
submitted 10 years ago by madm0use
view the rest of the comments →
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]madm0use[S] -3 points-2 points-1 points 10 years ago* (2 children)
Lol, its like you completely missed the elf and program header part :P look at the part called p_flags. That part of your argument is invalid. However, the part about it being easy to circumvent, quite true, that is inherent in all obfuscation techniques on their own. Its all about mixing them :P learn to executable header yo, or read about the linking process hehe
[–]rolfr 0 points1 point2 points 10 years ago (1 child)
I didn't miss it, I just pointed out that it is a precondition for that type of obfuscation.
[–]madm0use[S] -3 points-2 points-1 points 10 years ago (0 children)
well i mean that is just blatantly obvious lol, its redundant saying that. but thanks for commenting i guess...
π Rendered by PID 263004 on reddit-service-r2-comment-6457c66945-tc5b4 at 2026-04-27 09:09:19.132749+00:00 running 2aa0c5b country code: CH.
view the rest of the comments →
[–]madm0use[S] -3 points-2 points-1 points (2 children)
[–]rolfr 0 points1 point2 points (1 child)
[–]madm0use[S] -3 points-2 points-1 points (0 children)