From APT28 to RePythonNET: automating .NET malware analysis

This blogpost covers the tooling and methodology we use at TDR to reverse engineer .NET malware. In our daily work, we encounter a wide range of malware, sophisticated or not, and a significant portion of it is written in .NET. Yet, the .NET reverse engineering ecosystem remains surprisingly thin, with few dedicated tools and few […]

La publication suivante From APT28 to RePythonNET: automating .NET malware analysis est un article de Sekoia.io Blog.

This article has been indexed from Sekoia.io Blog

Read the original article: