Media Summary: Fireeye made a white paper on cmd.exe command obfuscation ( The strings of this trojan-spy are obfuscated. We figure out that this is a monoalphabethic substitution cipher and patch the trojan ... This video shows you how to use de4dot for the most common use cases, including obfuscation

Malware Analysis Dosfuscation Deobfuscation - Detailed Analysis & Overview

Fireeye made a white paper on cmd.exe command obfuscation ( The strings of this trojan-spy are obfuscated. We figure out that this is a monoalphabethic substitution cipher and patch the trojan ... This video shows you how to use de4dot for the most common use cases, including obfuscation If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ... Using Spora as example we learn how to use articles about malware families as an aid for learning I describe three ways to find or get fresh

Created by: 8bits0fbr In this first video, I explore a few different methods of Do you like solving programming puzzles? Want to uncover what a malicious attacker is actually trying to do with their code? This video is part of the Udacity course "Intro to Information Security". Watch the full course at ... I created a video showing how to de-obfuscate a In this and the next video we'll analyse a sample from the popular Emotet

Photo Gallery

Malware Analysis - DOSfuscation Deobfuscation
Malware Analysis - Deobfuscating Loyeetro Trojan-Spy
Malware Analysis - Deobfuscating .NET Assemblies with De4Dot
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
JScript Deobfuscation - More WSHRAT (Malware Analysis)
Malware Analysis - Java Malware Deobfuscation
Malware Analysis - Exploring Spora's Encryption Procedure
Malware Analysis - Finding Fresh Samples Without Paid Account
MalWerewolf: JS/Shellcode Deobfuscation Part 1
Malware Analysis: 002_JavaScript Deobfuscation: Dealing with Arrays - Part 1
Deciphering Obfuscated JavaScript Malware
Malware Obfuscation
View Detailed Profile
Malware Analysis - DOSfuscation Deobfuscation

Malware Analysis - DOSfuscation Deobfuscation

Fireeye made a white paper on cmd.exe command obfuscation (

Malware Analysis - Deobfuscating Loyeetro Trojan-Spy

Malware Analysis - Deobfuscating Loyeetro Trojan-Spy

The strings of this trojan-spy are obfuscated. We figure out that this is a monoalphabethic substitution cipher and patch the trojan ...

Malware Analysis - Deobfuscating .NET Assemblies with De4Dot

Malware Analysis - Deobfuscating .NET Assemblies with De4Dot

This video shows you how to use de4dot for the most common use cases, including obfuscation

MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

JScript Deobfuscation - More WSHRAT (Malware Analysis)

JScript Deobfuscation - More WSHRAT (Malware Analysis)

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

Malware Analysis - Java Malware Deobfuscation

Malware Analysis - Java Malware Deobfuscation

Deobfuscating

Malware Analysis - Exploring Spora's Encryption Procedure

Malware Analysis - Exploring Spora's Encryption Procedure

Using Spora as example we learn how to use articles about malware families as an aid for learning

Malware Analysis - Finding Fresh Samples Without Paid Account

Malware Analysis - Finding Fresh Samples Without Paid Account

I describe three ways to find or get fresh

MalWerewolf: JS/Shellcode Deobfuscation Part 1

MalWerewolf: JS/Shellcode Deobfuscation Part 1

Created by: 8bits0fbr@in In this first video, I explore a few different methods of

Malware Analysis: 002_JavaScript Deobfuscation: Dealing with Arrays - Part 1

Malware Analysis: 002_JavaScript Deobfuscation: Dealing with Arrays - Part 1

Malware Analysis

Deciphering Obfuscated JavaScript Malware

Deciphering Obfuscated JavaScript Malware

Do you like solving programming puzzles? Want to uncover what a malicious attacker is actually trying to do with their code?

Malware Obfuscation

Malware Obfuscation

This video is part of the Udacity course "Intro to Information Security". Watch the full course at ...

Hiding Malicious code using windows CMD - Dosfuscation

Hiding Malicious code using windows CMD - Dosfuscation

I created a video showing how to de-obfuscate a

Malware Analysis  Deobfuscation Demo

Malware Analysis Deobfuscation Demo

ethical hacker

Emotet Malware Analysis - Part 1 - Deobfuscating VBS code

Emotet Malware Analysis - Part 1 - Deobfuscating VBS code

In this and the next video we'll analyse a sample from the popular Emotet