Breaking down Akamai's mobile bot management SDK on Android — the encryption sch...
martinsummers
In this post, I will be covering a dynamic JavaScript and Java anti-bot solution...
obfio
In the expanding world of AI my heart still lies in AST transforms, browser fing...
nullpt.rs
This is part 2 to a series where I'm showing the process of reverse engineering ...
Firstly, I want to introduce PerimeterX (PX) anti-bot. PX is a very common anti-...
The main reason for reverse engineering an anti-bot, which we did in part 1, is ...
I’m conflicted every time I write one of these posts.
Passwords are dying—slowly, awkwardly, and not without a fight. Large parts of t...
This project was entered into as a learning experience, to enhance my knowledge ...
On October 10th, 2023, I stumbled upon an arbitrary code execution vulnerability...
SteakEnthusiast
FairPlay comprises a set of algorithms created by Apple for digital rights manag...
Nicolò Altamura
As of 2023, Grand Theft Auto V remains the second best-selling video game at 185...
Debuggers serve as invaluable tools that empower developers to halt code executi...
Exploring native functions on Android tutorial. Mobile penetration testing often...
Moty Manelis
This article I am going to show you how you can use various tools to reverse eng...
yog
This is a continuation of a series. If you haven't read the previous post, click...
A deep dive into Kasada's virtualization obfuscation on Nike.com — reverse engin...
TikTok has a reputation for its aggressive data collection. In fact, an article ...
In this post, we will be targetting and reverse engineering the CoinMarketCap(CM...
This article assumes a preliminary understanding of Abstract Syntax Tree structu...
A deep dive into building disassemblers for virtual machine-based code obfuscati...
Tim Blazytko
Jscrambler, a leader in JavaScript Client-side security makes claims to “Bullet-...