Comment by saagarjha

Comment by saagarjha 6 hours ago

0 replies

The tools you’re talking about are not exclusive to offensive security. They’re plenty useful for malware analysis and other reverse engineering tasks.