Comments on: Smart DLL execution for Malware Analysis in Sandbox Systems https://www.nextron-systems.com/2014/10/04/smart-dll-execution-malware-analysis-sandbox-systems/ We Detect Hackers Tue, 04 Oct 2022 13:53:00 +0000 hourly 1 By: Albert https://www.nextron-systems.com/2014/10/04/smart-dll-execution-malware-analysis-sandbox-systems/#comment-22 Tue, 23 Feb 2016 18:14:37 +0000 http://www.bsk-consulting.de/?p=1006#comment-22 python dllrunner.py -f C:\folder\ROndutySql.dll –debug –fuzz

]]>
By: 051R15 https://www.nextron-systems.com/2014/10/04/smart-dll-execution-malware-analysis-sandbox-systems/#comment-21 Thu, 16 Oct 2014 00:15:37 +0000 http://www.bsk-consulting.de/?p=1006#comment-21 I like it. 🙂

]]>
By: Manuel Bär https://www.nextron-systems.com/2014/10/04/smart-dll-execution-malware-analysis-sandbox-systems/#comment-20 Mon, 13 Oct 2014 19:20:58 +0000 http://www.bsk-consulting.de/?p=1006#comment-20 Would be interesting to do some binary analysis of a function before passing in arguments. E.g. number of arguments used or even types.

]]>