1 code implementation • 23 Apr 2019 • Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto
We used PowerDrive to successfully analyze thousands of PowerShell attacks extracted from various malware vectors and executables.
Cryptography and Security