Threat Labs

Notes from the life of the reverse engineering wizards

Binary Reuse of VB6 P-Code Functions

Reusing binary code from malware is one of my favorite topics. Binary re-engineering and being able to bend compiled code to your will is really just an amazing skill. Allow me to show you the way

VB6 P-Code Disassembly

Reversing the VB6 in general, and P-Code in particular, has always been a problem area. Let's reveal the inner depths of VB6 P-Code disassembly and the VB6 runtime

VB6 P-Code Obfuscation

Code obfuscation is one of the cornerstones of malware. The harder code is to analyze the longer attackers can fly below the radar and hide the full capabilities of their creations. Code obfuscation techniques are very old and take many many...