does anyone have good prompts for basic deobfuscation + find key IOCs from a malicious payload/dropper/etc? e.g. we can hurl it in there and then tell it to check it's work and it usually gets the (correct) c2s...eventually. But there's a better way...right? 😅
5,91K