Common Malware Obfuscation Techniques

Disclaimer

Techniques

Independently and on their own, these are useful. In conjunction, these are effective. They aren't hard things to do. Test it for yourself (in a legal setting) and see.


Check out these notes...