Tagged | reverse-engineering
-
Malware analysis: Hands-On Shellbot malware
(sysdig.com) -
CNN for Reverse Engineering: an Approach for Function Identification
(towardsdatascience.com)#data-science #machine-learning #systems #reverse-engineering
-
Picture Perfect: How JPG EXIF Data Hides Malware
(umbrella.cisco.com) -
Reverse Engineering an Obfuscated Malicious Macro
(medium.com) -
How I reverse engineered Notion API
(itnext.io) -
Malware Analysis: Kardon Loader
(engineering.salesforce.com) -
Satan Ransomware Spawns New Methods to Spread
(hackernoon.com) -
Malware Analysis: Decoding Emotet, Part 1
(engineering.salesforce.com) -
Binary Exploitation ELI5– Part 1
(hackernoon.com) -
Malware Analysis: New Trojan Double Dropper
(engineering.salesforce.com) -
QuantLoader: An In-Depth Malware Analysis
(engineering.salesforce.com) -
Introducing Ponce: One-click Symbolic Execution
(engineering.salesforce.com) -
Concolic Execution and Code Coverage with Triton
(engineering.salesforce.com)