Who might benefit from reading this blog:
- Reverse engineers/security researchers
- Windows developers
- Computer security enthusiasts
- General developers interested in the inner workings of things
This blog is not recommended if you are:
- Looking to develop malicious code or perform anything criminal
Any code contained within this blog relevant to malware or evasion techniques is ensured to be detectable prior to posting.