Reverse engineering using other tools.
Posted by jpluimers on 2016/01/26
Interesting read: [Interesting post] Part 3 – Reverse engineering using other tools. ….
It’s about doing the reverse of obfuscating. Not only convenient to look how certain software was constructed, but also about learning what could me malicious code.
–jeroen






Leave a comment