Linking pages
- Reverse engineering Emotet – Our approach to protect GRNET against the trojan | GRNET CERT https://cert.grnet.gr/en/blog/reverse-engineering-emotet/ 19 comments
- Romain Thomas https://www.romainthomas.fr/post/22-09-ios-obfuscation-syscall-hooking/ 0 comments
- GitHub - meme/hellscape: GIMPLE obfuscator for C, C++, Go, ... all supported GCC targets and front-ends that use GIMPLE. https://github.com/meme/hellscape 0 comments
- GitHub - cea-sec/miasm: Reverse engineering framework in Python https://github.com/cea-sec/miasm 0 comments
- GitHub - Spacial/awesome-csirt: Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities. https://github.com/Spacial/csirt 0 comments
- Control Flow Unflattening https://eybisi.run/Control-Flow-Unflattening/ 0 comments
Linked pages
Related searches:
Search whole site: site:blog.quarkslab.com
Search title: Deobfuscation: recovering an OLLVM-protected program
See how to search.