Dec. 6, 2022, 4:59 p.m. | OALabs

OALabs www.youtube.com

How to automatically extract the shell code from a multi-stage PowerShell loader (Cobalt Strike) using CyberChef!

See the full stream, including our analysis of the shell code...
https://www.patreon.com/posts/live-stream-vod-75195977

-----
OALABS PATREON
https://www.patreon.com/oalabs

OALABS DISCORD
https://discord.gg/6h5Bh5AMDU

Twitch
https://www.twitch.tv/oalabslive

OALABS GITHUB
https://github.com/OALabs

UNPACME - AUTOMATED MALWARE UNPACKING
https://www.unpac.me/#/
-----

cyberchef extract loader powershell shellcode twitch

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Offensive Security Engineer

@ Ivanti | United States, Remote

Senior Security Engineer I

@ Samsara | Remote - US

Senior Principal Information System Security Engineer

@ Chameleon Consulting Group | Herndon, VA

Junior Detections Engineer

@ Kandji | San Francisco

Data Security Engineer/ Architect - Remote United States

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700