Print

Print


Hello list!

Certainly worth reading through, the methods they use can also apply  
to just trying to understand someone else's harmless-but-badly-formed  
code.

http://pandalabs.pandasecurity.com/deobfuscating-malicious-code-layer-by-layer/

Best,
Tucci