Obfuscation is often easy to recognize when it is being used; but not so easy when it pretends to be part of a binary's embedded data and used to communicate secrets back and forth. Introduction This article covers a handful of fun ways to play with executable binary files instead....
Read the rest of this story with a free account.
Already have an account? Sign in
- OfficialSeptember 26, 2023Hunting for macOS Ransomware Using VirusTotal Enterprise
- OfficialSeptember 10, 2023VirusTotal’s Code Insight Versus ChatGPT Analysis
- New EditionSeptember 1, 2023Forensic Fun with Cryptographic DataFrames using Python
- OfficialAugust 15, 2023There are Three CyberChefs!