top of page
The Cyber Yeti | Keep Exploring
Home
YouTube
Live Stream Schedule
Community
Discord
Training
Where do I start?
Malware Mondays
Quick Reference
PCAPs
Podcast
Blog
Newsletter
More
Use tab to navigate through the menu items.
All Posts
Malware Analysis
Reverse Engineering
Ethical Hacking
Network Monitoring
Josh Stroschein
Jan 6, 2021
1 min read
Creating an IDA Python Plugin for Static XOR String Deobfuscation
In this video, we’ll explore a recent XLS document that drops and executes a DLL using RUNDLL32. The DLL is small and only used to...
bottom of page