How we developed our simple Harbour decompiler - Printable Version +- Geeks for your information (https://www.geeks.fyi) +-- Forum: Security (https://www.geeks.fyi/forumdisplay.php?fid=68) +--- Forum: Security Vendors (https://www.geeks.fyi/forumdisplay.php?fid=87) +---- Forum: Kaspersky (https://www.geeks.fyi/forumdisplay.php?fid=90) +----- Forum: Kaspersky Security Blog (https://www.geeks.fyi/forumdisplay.php?fid=142) +----- Thread: How we developed our simple Harbour decompiler (/showthread.php?tid=9608) |
How we developed our simple Harbour decompiler - harlan4096 - 23 December 19 Quote:Every once in a while we get a request that leaves us scratching our heads. With these types of requests, existing tools are usually not enough and we have to create our own custom tooling to solve the “problem”. One such request dropped onto our desk at the beginning of 2018, when one of our customers – a financial institution – asked us to analyze a sample. This in itself is nothing unusual – we receive requests like that all the time. But what was unusual about this particular request was that the sample was written in ‘Harbour’. For those of you who don’t know what Harbour is (just like us), you can take a look here, or carry on reading.Continue Reading |