Reverse Engineering – MaIware ldentification
Today, the most common use for reverse engineering is in targeting malware. Like any other software, malware has its installation process. The difference is that it does not ask for...
C / Cryptography / Programming / YouTube
Shannon’s Entropy: Detecting Encryption and Compression in Data
December 31, 2024
Analyzing Phishing Attacks: Lumma Stealer and PowerShell Obfuscation
December 30, 2024
Analyzing Phishing Attacks: Lumma Stealer and PowerShell Obfuscation
December 30, 2024
A Beginner’s Guide to Navigating SDR++: Mastering the Basics
December 16, 2024
Today, the most common use for reverse engineering is in targeting malware. Like any other software, malware has its installation process. The difference is that it does not ask for...