Emulating Obfuscated Code

Поділитися
Вставка
  • Опубліковано 22 лис 2024

КОМЕНТАРІ • 8

  • @OALABS
    @OALABS 4 місяці тому +14

    Thanks for having me 😸

    • @OffByOneSecurity
      @OffByOneSecurity  4 місяці тому +1

      Thanks for coming on. It was a great session!

  • @StarOfDavidKush
    @StarOfDavidKush 4 місяці тому +4

    Great segment gentleman, thanks!!

  • @FlyDragonfly-y5h
    @FlyDragonfly-y5h Місяць тому

    Really awesome and informative! Thanks for your work fellas!

  • @this-already-takes-too-long
    @this-already-takes-too-long 11 днів тому

    Great stream, thanks guys!

  • @Ethernel0
    @Ethernel0 4 місяці тому +3

    Holy shi OALABS and OBOS colab

  • @NatteeSetobol
    @NatteeSetobol 4 місяці тому +1

    This is really awesome! I remember seeing Anuj Soni emulated Windows assembly code he got from IDA that de-obfuscated a string when he was on stream and I was really wondering how you could do this. Now I kind of know and would like to try it out myself. Thanks!!

  • @StarOfDavidKush
    @StarOfDavidKush 4 місяці тому

    Awesome show 👌🏽