Keith
@kwm
This is a great technique for identifying relocation or name-based obfuscation of tools. The elegance of this technique is that it depends only on hash + path, benefiting folks who do not have access to authenticated binary metadata (i.e., publisher, original filename). https://x.com/r0wdy_/status/958770402720808960
1/31/2018, 11:54:40 AM
Favs: 6
Retweets: 4
link