5 minReverse Engineering Malware, Part 5: OllyDbg BasicsIn this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and...