Currently I am working on a project in high school where I am talking about reverse engineering malware. I am currently all set on every topic except how reverse engineering is documented in a business setting.
Hopefully someone can give me some insight!