I think that's 100% technically feasible, and useful in an operational context.
-
-
This is precisely one use case for mcsema. Ex, identify the C2 module in a piece of malware, lift it out, patch it into your own code.
-
I'm sure you could stitch together a full program from found parts. Like, grab a webcam module from here, and a keylogger from there, etc
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.