<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>compress | RobWillis.info</title>
	<atom:link href="/tag/compress/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>#yolosec</description>
	<lastBuildDate>Sun, 02 Aug 2020 03:57:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Invoke-Decoder &#8211; A PowerShell script to decode/deobfuscate malware samples</title>
		<link>/2020/08/invoke-decoder-a-powershell-script-to-decode-deobfuscate-malware-samples/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Sun, 02 Aug 2020 03:57:08 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[PowerShell/Scripting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[base64]]></category>
		<category><![CDATA[compress]]></category>
		<category><![CDATA[Decode]]></category>
		<category><![CDATA[gzip]]></category>
		<category><![CDATA[Invoke-Decoder]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[xor]]></category>
		<guid isPermaLink="false">/?p=4931</guid>

					<description><![CDATA[<p>I have been spending a lot of time reviewing PowerShell based attacks and malware over the last few months and I wanted to take some time to really understand how some of the common obfuscation techniques really work under the hood. The best way for me to learn more about something like this is to [&#8230;]</p>
The post <a href="/2020/08/invoke-decoder-a-powershell-script-to-decode-deobfuscate-malware-samples/">Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
