Behind the scenes we've developed 6 different cryptanalysis techniques for detecting embedded executables, we'll be testing all the methods to determine the most effective and efficient one(s). You may have noticed some clean samples taking a while to run, we've been sequentially exhaustively searching with various techniques to locate embedded executables, a key indicator for a malicious document.
Update: cut-bytes.py Version 0.0.18
-
This is a fix for escape sequences that trigger warnings in the latest
Python versions. cut-bytes_V0_0_18.zip (http)MD5:
C5FE455A5371C6675EDF16200D7C5657SH...
3 days ago
No comments:
Post a Comment