A technical walkthrough of Shape Security's JavaScript VM-based protection — unp...
svebaa
ShapeSecurity's Javascript Virtual Machine(VM) has a remarkable reputation for b...
botting.rocks
In previous part, we talked about the VM Internals especifically about the VM Ma...
Okay, now that we have finished talking about the VM Machinery in part 1 and the...
This is a continuation of a series. If you haven't read the previous post, click...
nullpt.rs
A deep dive into Kasada's virtualization obfuscation on Nike.com — reverse engin...
TikTok has a reputation for its aggressive data collection. In fact, an article ...
A deep dive into building disassemblers for virtual machine-based code obfuscati...
Tim Blazytko