Tips For Writing a .NET Static Config Extractor for Malware [ Reverse Engineering AMA ]

Published: 30 December 2022
on channel: OALabs
831
29

What are some tips for dealing with static config extraction of .NET malware?

--

Big thanks to all the reverse engineers who helped us put this together!

Rattle (Jesko)
  / huettenhain  
https://github.com/binref/refinery

Jordan (psifertex)
  / psifertex  
https://binary.ninja/

Karsten
  / struppigel  
   / malwareanalysisforhedgehogs  

Drakonia
  / dr4k0nia  
https://dr4k0nia.github.io/

C3rb3ru5
  / c3rb3ru5d3d53c  
https://c3rb3ru5d3d53c.github.io/

Josh
  / jershmagersh  
https://pwnage.io/

Dodo
  / dodo_sec  
https://github.com/dodo-sec

Washi
  / washi_dev  
https://washi.dev/

-----
OALABS PATREON
  / oalabs  

OALABS DISCORD
  / discord  

Twitch
  / oalabslive  

OALABS GITHUB
https://github.com/OALabs

UNPACME - AUTOMATED MALWARE UNPACKING
https://www.unpac.me/#/
-----


Watch video Tips For Writing a .NET Static Config Extractor for Malware [ Reverse Engineering AMA ] online without registration, duration hours minute second in high quality. This video was added by user OALabs 30 December 2022, don't forget to share it with your friends and acquaintances, it has been viewed on our site 831 once and liked it 29 people.