Loved every minute of this video. It's always fun to see what, how others work to de-obfuscate / reverse certain payloads. Hope to see similar videos in the future! golgothus
Loved every minute of this video. It's always fun to see what, how others work to de-obfuscate / reverse certain payloads. Hope to see similar videos in the future!
Man i really liked this guy's personality. Adding cartoon sounds to each sentence is not a thing lot of people can do while keeping it enjoyable vaibhav
Man i really liked this guy's personality. Adding cartoon sounds to each sentence is not a thing lot of people can do while keeping it enjoyable
Can't agree more with Ryan for using Perl for one-liners! trevlix
Can't agree more with Ryan for using Perl for one-liners!
It's awesome explanation, keep up guys.🎉 gvsai
It's awesome explanation, keep up guys.🎉
This was really great. Ryan (and John too) is awesome. KenPryor
This was really great. Ryan (and John too) is awesome.
Script exploits are exactly why I disable the Windows Script Host. sammorreel
Script exploits are exactly why I disable the Windows Script Host.
With most scripts i found the easiest way is to clean up the code a little bit and then replace evals with prints. Let the code decode itself for you! CuriousPiti
With most scripts i found the easiest way is to clean up the code a little bit and then replace evals with prints. Let the code decode itself for you!
This dudes the real deal! A real friendly and approachable person makes learning easy dannnnnno
This dudes the real deal! A real friendly and approachable person makes learning easy
Why wouldnt you do something like: 1+1 > 2 a= "1+1" > '1+1' eval(a) > 2 function eval(st) { console.log(st) } > undefined eval(a) > 1+1 It will stop your code from working but you can get the scripts it actually tries to run and replace the obfuscated stuff alex
Why wouldnt you do something like: 1+1 > 2 a= "1+1" > '1+1' eval(a) > 2 function eval(st) { console.log(st) } > undefined eval(a) > 1+1 It will stop your code from working but you can get the scripts it actually tries to run and replace the obfuscated stuff
Hello John, love your content and especially this kind of things.Keep it up❤❤❤❤ NavyEagle
Hello John, love your content and especially this kind of things.Keep it up❤❤❤❤
one point one million and rising well deserved xCheddarBbx
one point one million and rising well deserved
Lazy analyst approach to javascript malware -> replace eval with document.write and just run it. ukaszgeras
Lazy analyst approach to javascript malware -> replace eval with document.write and just run it.
This pals from palword got malicious real quick with that AI. BrutusMaximusAurelius
This pals from palword got malicious real quick with that AI.
Ryan is the pimp, love his trainings. Badams
Ryan is the pimp, love his trainings.
Does anyone have a link for Box PowerShell? dyarizadeh
Does anyone have a link for Box PowerShell?
Edit 3.js and replace eval with console.log then run. No need for A debugger to Comcast strings!!! gonehaywire
Edit 3.js and replace eval with console.log then run. No need for A debugger to Comcast strings!!!
Remind me to add "cornucopia" to my vocabulary when describing cyber distros dyarizadeh
Remind me to add "cornucopia" to my vocabulary when describing cyber distros
Qui is latin for what, Pikachu what? Meme. Also did the dude seriously put the divine comedy in latin as obfuscation? anarchoraven
Qui is latin for what, Pikachu what? Meme. Also did the dude seriously put the divine comedy in latin as obfuscation?
Like there's js-beautify there is uglify-js. Hehe nicksonpinto
Like there's js-beautify there is uglify-js. Hehe