Skip to content

Instantly share code, notes, and snippets.

@MH2033
MH2033 / gist:510d26b2bd2b9caec9beb61fe481fa45
Last active August 6, 2022 09:16
Research on making reverse engineer proof C++ apps
1. Tools for analyzing and exploring executables
strings, nm, readelf, objdump
2. Compiler flags to exclude global symbol table and information generated by compiler(Also removing dead code)
"-fvisibility=hidden -fdata-sections -ffunction-sections -Wl,--gc-sections -Wl,-s -Wl,--exclude-libs=ALL"
3. Making program safe against nm command by stripping unnecessary code sections
"strip -S -R .comment -R .note -R .note.ABI-tag <exec name>"
4. Removing linkage details and used library names from the executable(removing RPATH and RUNPATH info)
@MH2033
MH2033 / curl-push-azure-storage-blob.sh
Created April 21, 2022 05:42 — forked from gregjhogan/curl-push-azure-storage-blob.sh
Push a file to a blob in an Azure storage account
curl -X PUT -T ./{file.dat} -H "x-ms-date: $(date -u)" -H "x-ms-blob-type: BlockBlob" "https://{storageaccount}.blob.core.windows.net/backups/{file.dat}?{sas-token}"