Dec. 29, 2022, 6:19 p.m. | OALabs

OALabs www.youtube.com

What is the more embarrassing, crude, or downright outrageous malware that you have reverse engineered?

--

Big thanks to all the reverse engineers who helped us put this together!

Rattle (Jesko)
https://twitter.com/huettenhain
https://github.com/binref/refinery

Jordan (psifertex)
https://twitter.com/psifertex
https://binary.ninja/

Karsten
https://twitter.com/struppigel
https://www.youtube.com/c/MalwareAnalysisForHedgehogs

Drakonia
https://twitter.com/dr4k0nia
https://dr4k0nia.github.io/

C3rb3ru5
https://twitter.com/c3rb3ru5d3d53c
https://c3rb3ru5d3d53c.github.io/

Josh
https://twitter.com/jershmagersh
https://pwnage.io/

Dodo
https://twitter.com/dodo_sec
https://github.com/dodo-sec

Washi
https://twitter.com/washi_dev
https://washi.dev/

-----
OALABS PATREON
https://www.patreon.com/oalabs

OALABS DISCORD
https://discord.gg/6h5Bh5AMDU

Twitch
https://www.twitch.tv/oalabslive

OALABS GITHUB
https://github.com/OALabs

UNPACME - AUTOMATED MALWARE UNPACKING
https://www.unpac.me/#/
-----

ama engineering malware reverse reverse engineering

Red Team Penetration Tester and Operator, Junior

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)

Director, Security Operations & Risk Management

@ Live Nation Entertainment | Toronto, ON

IT and Security Specialist APAC (F/M/D)

@ Flowdesk | Singapore, Singapore, Singapore

Senior Security Controls Assessor

@ Capgemini | Washington, DC, District of Columbia, United States; McLean, Virginia, United States

GRC Systems Solution Architect

@ Deloitte | Midrand, South Africa

Cybersecurity Subject Matter Expert (SME)

@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States