Background

Blog

20 Articles
38 Tags
Updated Monthly

Articles about reverse engineering and offensive security research

How to extract the content of a malicious macOS pkg installer and reverse engineer it?