WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Guide binprotect — Stealthy x64 PE bin2bin Obfuscator with VM

byte_corvus

Expert
Expert
Expert
Expert
Status
Offline
Joined
Mar 3, 2026
Messages
750
Reaction score
457
Getting tired of the same old lazy obfuscators that just slap an extra section at the end of your binary and scream "analyze me" to every primitive heuristic? I found this project recently that takes a much more surgical approach to binary protection.

binprotect is a bin2bin rewriter for x64 PE files. Unlike your typical protectors that append junk at the end of the file, this tool injects obfuscated code directly into the original sections by tracking every single RVA (Relative Virtual Address). This makes it significantly harder for a reverse engineer to separate the wheat from the chaff just by looking at the section headers.

You cant view this link please login.

You cant view this link please login.


Core Mechanics & Re-writing Logic

The engine is built around a robust binary rewriter. When you feed it a binary, it doesn't just guess; it tracks relative addresses and updates every reference when bytes are shifted. This prevents the usual instability you see with low-tier bin2bin tools.

  1. Basic Block Splitting: Handles overlapping blocks and ensures instructions aren't duplicated.
  2. Indirect Control Flow: Supports jump tables for MSVC, LLVM/CLANG, and GCC (including multi-level tables).
  3. Noreturn Handling: Correctly identifies functions like _CxxThrowException to avoid disassembling junk padding as code.
  4. Exceptions Support: The tool inserts a frame pointer (RBP) into functions to maintain stack-unwinding even when the obfuscator allocates its own stack space.

Implemented Obfuscation Passes

  1. Virtual Machine: Translates x86-64 into a custom virtual CPU architecture. It randomizes the virtual register mapping on the stack and uses unique hardware registers for stubs. It even supports stack unwinding within the VM context.
  2. Opaque Predicates: Uses Fermat’s Last Theorem to create branches to fake basic blocks. The parameters are pulled from the stack and instruction pointers at runtime, making them dynamic and painful to solve statically.
  3. Control Flow Flattening (CFF): Transforms the function logic into a central dispatcher stub. The code blocks are physically shuffled in memory, nuking any chance of visual flow analysis in IDA/Ghidra.
  4. Mixed Boolean Arithmetic (MBA): Replaces simple operations with complex linear identities. It can do this recursively, turning a simple addition into a mess of AND/OR/XOR gates.
  5. Linear Substitution: Hides immediate values and displacements by calculating them at runtime using random constants.

Technical Implementation Notes

The tool is written in C++ and uses CMake for the build system. For the best results, you should provide a symbol file (PDB/MAP). While the tool can work without them, symbols are required for high-level features like CFF and full exception support.

1nQBdgL.png


How to Build & Run

Code:
mkdir build
cd build
cmake .. -DCMAKE_TOOLCHAIN_FILE=PATH_TO_VCPKG/scripts/buildsystems/vcpkg.cmake
cmake --build .

Usage is straightforward via CLI:
Code:
binprotect binary.exe symbols.pdb --vm 1 --cff 1 --mba 2

This isn't just a simple paste; the RVA tracking logic alone is worth studying if you're into binary instrumentation or building your own protectors. It's currently x64 only, but the architecture seems ready for ELF if someone wants to port it.

Any of you guys tried running this against Vanguard or EAC? Curious to see if the section-injection approach holds up against their latest integrity checks.
 
Top