Published On Feb 18, 2023
ESXiArgs has been running a rampage on the internet, but we need to figure out what. In this video we'll do a deep dive on the ESXiArgs malware and see if there's anything fishy that we can take advantage of to decrypt the files.
🏫 COURSES 🏫
Learn to code in C and Assembly at https://lowlevel.academy
đź›’ GREAT BOOKS FOR THE LOWEST LEVELđź›’
Blue Fox: Arm Assembly Internals and Reverse Engineering: https://amzn.to/4394t87
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation : https://amzn.to/3C1z4sk
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software : https://amzn.to/3C1daFy
The Ghidra Book: The Definitive Guide: https://amzn.to/3WC2Vkg
🔥🔥🔥 SOCIALS 🔥🔥🔥
Low Level Merch!: https://www.linktr.ee/lowlevellearning
Follow me on Twitter:   / lowleveltweets Â
Follow me on Twitch:   / lowlevellearning Â
Join me on Discord!:   / discord Â