Explore >> Select a destination


You are here

reverse.put.as
| | cocomelonc.github.io
5.2 parsecs away

Travel
| | [AI summary] The provided text discusses the development of a payload using a custom encryption method, likely based on the Skipjack algorithm, to evade detection by antivirus systems. It outlines the steps to compile and run the payload on a Windows machine, and mentions that the code is intended for educational purposes only. The text also references the Clipper chip initiative and highlights the importance of awareness for cybersecurity professionals.
| | toddcullumresearch.com
5.5 parsecs away

Travel
| | Purpose of this page This is a continuously updated page and it is never finished! I decided to go ahead and cover the tools I typically use for analyzing malware because although Ive found lists elsewhere, Ive found no real big collection with explanation and/or any type of discussion of these tools. Its generally more... Read More
| | blog.deobfuscate.io
4.0 parsecs away

Travel
| | Reverse engineering a binary obfuscated with virtual machine obfuscation. The challenge is vmcrack from Hack The Box.
| | www.malwaretech.com
25.8 parsecs away

Travel
| One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b...