Malware Unicorn
twitter:
@malwareunicorn
Company:
Endgame, Inc.
View My GitHub Profile
Go Back to All WorkShops
Reverse Engineering Malware 102
Material
Introduction
Section 1)
Setup
Section 2)
Information Gathering
Section 3)
Creating Travel Directions
Section 4)
Identifying Encryption
Section 5)
Evasion Techniques
Section 6)
Identifying Packing
Section 7)
Extra Fun
Section 8)
Conclusion