What are some tips for dealing with static config extraction of .NET malware?
--
Big thanks to all the reverse engineers who helped us put this together!
Rattle (Jesko)
/ huettenhain
https://github.com/binref/refinery
Jordan (psifertex)
/ psifertex
https://binary.ninja/
Karsten
/ struppigel
/ malwareanalysisforhedgehogs
Drakonia
/ dr4k0nia
https://dr4k0nia.github.io/
C3rb3ru5
/ c3rb3ru5d3d53c
https://c3rb3ru5d3d53c.github.io/
Josh
/ jershmagersh
https://pwnage.io/
Dodo
/ dodo_sec
https://github.com/dodo-sec
Washi
/ washi_dev
https://washi.dev/
-----
OALABS PATREON
/ oalabs
OALABS DISCORD
/ discord
Twitch
/ oalabslive
OALABS GITHUB
https://github.com/OALabs
UNPACME - AUTOMATED MALWARE UNPACKING
https://www.unpac.me/#/
-----
Watch video Tips For Writing a .NET Static Config Extractor for Malware [ Reverse Engineering AMA ] online without registration, duration hours minute second in high quality. This video was added by user OALabs 30 December 2022, don't forget to share it with your friends and acquaintances, it has been viewed on our site 831 once and liked it 29 people.