Blog Archive
-
Recovering dProtect's Obfuscated Strings Using Katalina in an Android App
-
Poking around with FRIDA's Java enumerateClassLoaders
-
Solving iOS UnCrackable 1 Crackme Without Using an iOS Device
-
RageAgainstTheCage - Revisting Android adb setuid Exhaustion Attack
-
Differentiate an ELF executable from a shared library
-
Bypassing Android FLAG_SECURE using FRIDA
-
Frida, Magisk and SELinux
-
Bypassing anti-debugger check in iOS Applications
-
Working of LD_PRELOAD for Android Applications and its anti-RE Technique
-
Intercepting HTTPS Traffic of Android Nougat Applications
-
Bypassing SSL Pinning in Android Applications
-
Linux Thread is a Standard Process
-
Security Implications of Zygote Process Creation Model in Android
-
Android Zygote
-
TLS Sequence Numbers
-
iOS Solid State NAND Storage
-
Detecting Microsoft HTTP.sys Vulnerability
-
How Cuckoo Filters Can Improve Existing Approximate Matching Techniques
-
How to Detect a Drupal Installation
-
What is POODLE and How to Detect It
-
Dissecting TLS Client Hello Message
-
SSL/TLS Session Establishment
-
Introduction to Secure Socket Layer/Transport Layer Security Protocol
-
Detecting OpenSSL CCS Injection Vulnerability (CVE-2014-0224)
-
Wireshark Shows Network Packet Larger than MTU