<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>beautifier &#8211; Cerbero Blog</title>
	<atom:link href="https://blog.cerbero.io/tag/beautifier/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.cerbero.io</link>
	<description></description>
	<lastBuildDate>Tue, 28 Mar 2023 10:21:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.cerbero.io/wp-content/uploads/2023/09/cropped-pro_icon_512-32x32.png</url>
	<title>beautifier &#8211; Cerbero Blog</title>
	<link>https://blog.cerbero.io</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">184292133</site>	<item>
		<title>Reversing Complex PowerShell Malware</title>
		<link>https://blog.cerbero.io/reversing-complex-powershell-malware/</link>
					<comments>https://blog.cerbero.io/reversing-complex-powershell-malware/#respond</comments>
		
		<dc:creator><![CDATA[Erik Pistelli]]></dc:creator>
		<pubDate>Tue, 28 Mar 2023 10:21:28 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[beautifier]]></category>
		<category><![CDATA[Injection]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[Reversing]]></category>
		<guid isPermaLink="false">https://blog.cerbero.io/?p=2617</guid>

					<description><![CDATA[In this post we&#8217;re going to analyze a multi-stage PowerShell malware, which gives us an opportunity to use our commercial PowerShell Beautifier package and its capability to replace variables. Sample SHA2-256: 2840D561ED4F949D7D1DADD626E594B9430DEEB399DB5FF53FC0BB1AD30552AA Interestingly, the malicious script is detected by only 6 out of 58 engines on VirusTotal. We open the script in Cerbero Suite, decode &#8230; <a href="https://blog.cerbero.io/reversing-complex-powershell-malware/" class="more-link">Continue reading<span class="screen-reader-text"> "Reversing Complex PowerShell Malware"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/reversing-complex-powershell-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2617</post-id>	</item>
		<item>
		<title>PowerShell Beautifier Package</title>
		<link>https://blog.cerbero.io/powershell-beautifier-package/</link>
					<comments>https://blog.cerbero.io/powershell-beautifier-package/#respond</comments>
		
		<dc:creator><![CDATA[Erik Pistelli]]></dc:creator>
		<pubDate>Thu, 02 Mar 2023 11:35:41 +0000</pubDate>
				<category><![CDATA[Package]]></category>
		<category><![CDATA[beautifier]]></category>
		<category><![CDATA[Deobfuscation]]></category>
		<category><![CDATA[Powershell]]></category>
		<guid isPermaLink="false">https://blog.cerbero.io/?p=2533</guid>

					<description><![CDATA[PowerShell code is often seen in malware. To help the analysis of such code we have just released the &#8220;PowerShell Beautifier&#8221; package. The package is available to all commercial licenses of Cerbero Suite Advanced. The package features a complete parser for the PowerShell language and has many deobfuscation capabilities. If your organization is interested in &#8230; <a href="https://blog.cerbero.io/powershell-beautifier-package/" class="more-link">Continue reading<span class="screen-reader-text"> "PowerShell Beautifier Package"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/powershell-beautifier-package/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2533</post-id>	</item>
		<item>
		<title>XML Indenter</title>
		<link>https://blog.cerbero.io/xml-indenter/</link>
					<comments>https://blog.cerbero.io/xml-indenter/#respond</comments>
		
		<dc:creator><![CDATA[Alessandro Gario]]></dc:creator>
		<pubDate>Fri, 24 Feb 2012 16:25:25 +0000</pubDate>
				<category><![CDATA[Suite Standard]]></category>
		<category><![CDATA[beautifier]]></category>
		<category><![CDATA[beautify]]></category>
		<category><![CDATA[html]]></category>
		<category><![CDATA[indenter]]></category>
		<category><![CDATA[smgl]]></category>
		<category><![CDATA[xhtml]]></category>
		<category><![CDATA[xml]]></category>
		<guid isPermaLink="false">http://blog.icerbero.com/?p=253</guid>

					<description><![CDATA[With the release of the 0.7.7 we&#8217;ve bundled a new Python action particularly useful when dealing with unformatted XML. The following is an excerpt of an embedded XML file taken from a malicious PDF document. Focusing on security, this beautifier does not try to validate the content of the document, having also the advantage of &#8230; <a href="https://blog.cerbero.io/xml-indenter/" class="more-link">Continue reading<span class="screen-reader-text"> "XML Indenter"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/xml-indenter/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">253</post-id>	</item>
	</channel>
</rss>
