Media Summary: Fireeye made a white paper on cmd.exe command obfuscation ( The strings of this trojan-spy are obfuscated. We figure out that this is a monoalphabethic substitution cipher and patch the trojan ... If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

Malware Analysis Dosfuscation Deobfuscation - Detailed Analysis & Overview

Fireeye made a white paper on cmd.exe command obfuscation ( The strings of this trojan-spy are obfuscated. We figure out that this is a monoalphabethic substitution cipher and patch the trojan ... If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ... This video shows you how to use de4dot for the most common use cases, including obfuscation Created by: 8bits0fbr In this first video, I explore a few different methods of Using Spora as example we learn how to use articles about malware families as an aid for learning

Do you like solving programming puzzles? Want to uncover what a malicious attacker is actually trying to do with their code? In this and the next video we'll analyse a sample from the popular Emotet This video is part of the Udacity course "Intro to Information Security". Watch the full course at ...

Photo Gallery

Malware Analysis - DOSfuscation Deobfuscation
Malware Analysis - Deobfuscating Loyeetro Trojan-Spy
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
Malware Analysis - Deobfuscating .NET Assemblies with De4Dot
Malware Analysis - Java Malware Deobfuscation
JScript Deobfuscation - More WSHRAT (Malware Analysis)
Malware Analysis: 002_JavaScript Deobfuscation: Dealing with Arrays - Part 1
MalWerewolf: JS/Shellcode Deobfuscation Part 1
Malware Analysis - Exploring Spora's Encryption Procedure
Deciphering Obfuscated JavaScript Malware
Emotet Malware Analysis - Part 1 - Deobfuscating VBS code
Malware Obfuscation
Sponsored
View Detailed Profile
Malware Analysis - DOSfuscation Deobfuscation

Malware Analysis - DOSfuscation Deobfuscation

Fireeye made a white paper on cmd.exe command obfuscation (

Malware Analysis - Deobfuscating Loyeetro Trojan-Spy

Malware Analysis - Deobfuscating Loyeetro Trojan-Spy

The strings of this trojan-spy are obfuscated. We figure out that this is a monoalphabethic substitution cipher and patch the trojan ...

MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

Malware Analysis - Deobfuscating .NET Assemblies with De4Dot

Malware Analysis - Deobfuscating .NET Assemblies with De4Dot

This video shows you how to use de4dot for the most common use cases, including obfuscation

Malware Analysis - Java Malware Deobfuscation

Malware Analysis - Java Malware Deobfuscation

Deobfuscating

Sponsored
JScript Deobfuscation - More WSHRAT (Malware Analysis)

JScript Deobfuscation - More WSHRAT (Malware Analysis)

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

Malware Analysis: 002_JavaScript Deobfuscation: Dealing with Arrays - Part 1

Malware Analysis: 002_JavaScript Deobfuscation: Dealing with Arrays - Part 1

Malware Analysis

MalWerewolf: JS/Shellcode Deobfuscation Part 1

MalWerewolf: JS/Shellcode Deobfuscation Part 1

Created by: 8bits0fbr@in In this first video, I explore a few different methods of

Malware Analysis - Exploring Spora's Encryption Procedure

Malware Analysis - Exploring Spora's Encryption Procedure

Using Spora as example we learn how to use articles about malware families as an aid for learning

Deciphering Obfuscated JavaScript Malware

Deciphering Obfuscated JavaScript Malware

Do you like solving programming puzzles? Want to uncover what a malicious attacker is actually trying to do with their code?

Emotet Malware Analysis - Part 1 - Deobfuscating VBS code

Emotet Malware Analysis - Part 1 - Deobfuscating VBS code

In this and the next video we'll analyse a sample from the popular Emotet

Malware Obfuscation

Malware Obfuscation

This video is part of the Udacity course "Intro to Information Security". Watch the full course at ...

Nguyen Anh Quynh -- Opticode machine code deobfuscation for malware analysts

Nguyen Anh Quynh -- Opticode machine code deobfuscation for malware analysts

Modern