
Episode 3: H1-407 Event Madness & Takeaways Part 1
Critical Thinking - Bug Bounty Podcast
00:00
Dot Peak and I L Spy for Binary Decompiling Software
Joel: I L spy and dot peak will take that binary and decompile it back to the original source code. And this is like hella useful for reverse engineering these binaries. Joel: Jetbrins stuff always works really well. Sodot peak is like my go to now. He'll use I also sometimes if like dot peak struggles, but he don't think of a case where like dark because failed to do.
Transcript
Play full episode