Gather round infosec fam
I've gotten a ton of DMs on how I turned the disassembly from Code Red disassembly from into psytrance, this will be a thread on rough how this was achieved.
#Respect to @rpermeh whose awesome analysis of Code Red and disassembly I used for this track
The structure of the main function from the disassembly is a good one to use as a basis for how this is done.
Here is the disassembly:
There is different methods to transmogrify x86 into MIDI data and what I will demonstrate is one of the more simpler methods I have come up with.
This would be ASM Command to Note and is basically a substitution algorithm that maps byte codes to notes for MIDI.
Example:
I have a script that generates hundreds of these at a time.
This particular run produces something like this:
So essentially I am brute forcing malware to make music.
The next step is listening to hundreds of these beautiful pieces of cacophonous garbage using multiple instruments (yay).
It's not fun.
BUT eventually you get an ear worm out of these.
I then take those & build tracks
Matter of fact this run made a pretty decent psytrance bassline.
The script has some logic in it and ive been trying to make it smarter but brute force always seems to win.
Note in the example I added a 'mutator' where one ASM command doubles notes - this often helps a ton.
Tagging this tweet with #techtronica do I can find it later
Share this Scrolly Tale with your friends.
A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.
