In this blog post I’ll not only explain how to solve the challenge but will explain the algorithm used itself, what it is and why we often see it used in malware binaries.
RC4 Reverse Engineering Challenge

In this blog post I’ll not only explain how to solve the challenge but will explain the algorithm used itself, what it is and why we often see it used in malware binaries.
In this article we’ll learn how to investigate Sign logs in Azure Sentinel