<?xml version="1.0"?>
<rss version="2.0">
    <channel>
        <title>OpenRCE: Blog</title>
        <link>http://www.openrce.org/rss/feeds/blog</link>
        <description>OpenRCE: The Open Reverse Code Engineering Community</description>
                <item>
            <title>Exploring the Insides of your Favourite Malware Sandbox, a Generic Approach</title>
                            <pubDate>Mon, 09 Jul 2007 07:54:51 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/806/Exploring_the_Insides_of_your_Favourite_Malware_Sandbox,_a_Generic_Approach</link>
                                        <author>nullsub &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Hi all, &lt;br /&gt;
&lt;br /&gt;
The linked file contains a very short paper and source code explaining a generic methodology that can be used to RE your favourite malware sandbox. As an example i have included some stuff of Norman's one:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://vx.7a69ezine.org/re/nsandbox.zip&quot;&gt;http://vx.7a69ezine.org/re/nsandbox.zip&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Enjoy it!&lt;br /&gt;
&lt;br /&gt;
nullsub/7A69ML - http://vx.7a69ezine.org/</description>
                    </item>
            </channel>
</rss>
