All content is encrypted for your safety and to avoid being censored on GitHub,
to import the GPG key 66ED4A9A4D70D36FE48196419AD730FE9CDE5661
.
curl -sq https://github.com/opsxcq.gpg | gpg --import
And then decrypt it:
gpg --decrypt Win32Disassembler.exe.gpg > output
If the key is not trusted, the message bellow is shown but this doesn’t interfere with the normal workflow. But consider trusting the key to avoid these warnings.
gpg: Signature made Sat 15 Jan 2022 09:47:42 AM EST
gpg: using RSA key 66ED4A9A4D70D36FE48196419AD730FE9CDE5661
gpg: Good signature from "OPSXCQ <opsxcq@strm.sh>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 66ED 4A9A 4D70 D36F E481 9641 9AD7 30FE 9CDE 5661
Tools
Some old school reverse engineering tools are made available for your nostalgia:
Malware Samples
Bellow a small malware sample list, feel free to start a discussion or
contribute with more samples. Check the FORUM
link on the menu for more details.