Coming Soon
We’re preparing additional case studies analyzing real-world malware and backdoors with Kong. Check back soon for deep dives into:- Malware triage workflows
- CTF binary analysis
- Firmware reverse engineering
Try Kong now with 'pip install kong-re'!
More real-world case studies coming soon
Was this page helpful?