The FireEye Labs Advanced Reverse Engineering (FLARE) Team continues
to share knowledge and tools with the community. We started this blog
series with a script for href="/content/fireeye-www/en_US/blog/threat-research/2014/08/flare-ida-pro-script-series-automatic-recovery-of-constructed-strings-in-malware.html">Automatic
Recovery of Constructed Strings in Malware. As always, you can
download these scripts at the following location: href="https://github.com/fireeye/flare-ida">https://github.com/fireeye/flare-ida.
We hope you find all these scripts as useful as we do.