Extract config by CyberChef in advanced
1. Introduction
After analyzing malware, the next common step is to extract its configuration information for future research. Most people choose to write Python scripts for this task. While Python is powerful, it can be a challenge for those who pre...
n0pex3.hashnode.dev3 min read