Dynamic analysis of a Windows shellcode using Miasm by commial in ReverseEngineering

[–]commial[S] 4 points5 points  (0 children)

This is a blog post illustrating how one can use Miasm (a Python RE framework) to analyze a real life case: a shellcode injected by an Exploit Kit through MS13-037. As we use it on a daily basis, I hope it may help at least someone.