Why BINARY REWRITING is the FUTURE of Obfuscation
Learn how CodeDefender.io and Back.Engineering are pushing the boundaries of code obfuscation, virtualization and anti-tamper.
👨 💻 Buy Our Courses: https://guidedhacking.com/register/
💰 Donate on Patreon: https://patreon.com/guidedhacking
❤ ️ Follow us on Social Mediahttps://linktr.ee/guidedhackingng
GuidedHacking® - © 2025 Guided Hacking LLC. All Rights Reserved.
🔗 Back.Engineering + CodeDefenderhttps://codedefender.io/.https://back.engineering/ihttps://x.com/BackEngineerLabrLab
🔗 GH Lihttps://guidedhacking.com/threads/back-engineering-interview-codedefender-io-demo-gh-podcast-4.20946/c...
Listen to the Guided Hacking Show on these platformhttps://podcasters.spotify.com/pod/show/guidedhackinghhttps://soundcloud.com/guidedhackingnhttps://guidedhacking.com/forums/the-guided-hacking-podcast.569/-...
• The Guided Hacking Podcast
📜 Video Description:
In the first video episode of the Guided Hacking Podcast, we learn the history of the Back.Engineering team, how they met and why they are so obsessed with binary security. We talk about virtualization bin2bin obfuscation, deobfuscation, compilers, and more. We also discuss the approach the team took to build CodeDefender, the limitations of existing tools on the market such as VMProtect, and how their solution differs. Watch this episode to learn about all the cool stuff you won’t typically find properly documented online!
❤ ️ Try Malcore For Fhttps://link.malcore.io/redirect/guidedhackinguid...
Who is the Back.Engineering team?
The Back.Engineering team specializes in reverse engineering, tool development, software de obfuscation, and obfuscation techniques. They built CodeDefender, a solution that protects software against tampering, exploitation, and reverse engineering while preserving stability, performance, and compatibility with modern Windows security mechanisms.
The team:
Christopher Drumm – CEO & Founder (@_xerohttps://www.linkedin.com/in/idontcode/code
Bas Zweers – Compiler Enginhttps://www.linkedin.com/in/bas-zweers-127507330/7330
James McGowan – Security Researcher (focused on obfuscatihttps://www.linkedin.com/in/jwmcgowan/owan
What is CodeDefender
CodeDefender is a SaaS offering by the Back.Engineering team that provides protection against tampering, exploitation, and reverse engineering, while also ensuring stability, performance, and compatibility with modern Windows security mechanisms. Stability is core to CodeDefender's philosophy. Some of CodeDefender's notable features include mathematically robust obfuscation (which we discussed in the episode 😉 ), program hardening, and anti-tamper capabilities such as page encryption, API tampering detection, and byte patching prevention. Finally, CodeDefender offers binary diversification, allowing it to randomize the binary, thwart signature detection, automatically encrypt data, and obfuscate imports for enhanced security.
Technical Capabilities of CodeDefender
Chris, Bas, and James are really at the top of their game. They have implemented so many capabilities into CodeDefender like novel code coverage techniques, and proper exception handling enables seamless use of try/except blocks, eliminating the need for manual marking in your code. Most software protectors on the market struggle to support Control flow Enforcement Technology, with many sacrificing SEH support. Unlike most other software protectors, they proudly support Control Flow Guard to enhance your application's security. They have also built advanced obfuscation techniques that fully support Arbitrary Code Guard.
✏ ️ Tags:
GuidedHacking Podcast
anti-cheat
anticheat interview
back.engineering
anti-tamper
obfuscating code
backengineering
anticheat
back engineering
game hacking podcast
code defender
xeroxz
obfuscation
reverse engineering
antitamper
crypter
codedefender.io
guided hacking podcast
bin2bin
codedefender
binary rewriting
_xeroxz
Other Videos By Guided Hacking
Other Statistics
Counter-Strike: Source Statistics For Guided Hacking
At this time, Guided Hacking has 252,135 views for Counter-Strike: Source spread across 14 videos. The game makes up 3 hours of published video on his channel, roughly 2.79% of Counter-Strike: Source content that Guided Hacking has uploaded to YouTube.