Dump-GUY
Follow
Threat Researcher at Check Point (Former Forensic, Malware Analyst, Reverse Engineer - CERT)
Pinned Loading
-
Malware-analysis-and-Reverse-engineering
Malware-analysis-and-Reverse-engineering PublicSome of my publicly available Malware analysis and Reverse engineering.
-
Python3---Binary-Data-Manipulation
Python3---Binary-Data-Manipulation PublicPython 3 - Manipulation and conversation with different data type (Bytes operations)
-
Get-PDInvokeImports
Get-PDInvokeImports PublicGet-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke usage in assembly. Showing all locations from where they are …
-
ConfuserEx2_String_Decryptor
ConfuserEx2_String_Decryptor PublicConfuserEx2 String Decryptor & Full Deobfuscation Guide
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.