Jatin shankar Srivastavajatin-devopw.hashnode.dev·Dec 13, 2024Stripping in Reverse Engineering: A Concept Overview with Code ExampleStripping is a technique used in reverse engineering to remove or obfuscate non-essential metadata from a compiled binary. This process reduces the file size and makes it more challenging for reverse engineers to understand or analyze the executable....10 likes·26 readsBinary Stripping
Romman Sabbirrommansabbir.com·Nov 8, 2024Application Security in Android: A Comprehensive Guide [PART 3]Application security is essential for preventing unauthorized access, reverse engineering, and tampering with your Android apps. There are several strategies and tools that developers can employ to protect their applications from these threats. In th...62 readsAndroid : Security, Encryption and Secure Practicesrooted
John Kalimeriskalimerisjohn.hashnode.dev·Jul 8, 2024Deep Dive to Android R8 & Proguard [Part 2]Introduction 📖 In this second part we will further analyze the R8 compiler and the rules we can apply, in order to feet to our project. R8 vs Proguard 🥊 As we discussed in the first part R8 is a replacement tool for Proguard. But what are actual th...30 readsandroid app development
Smaranjit Ghoseblog.smaranjitghose.com·Jul 8, 2024Obfuscating Python Code with Subdora🤔 What is "obfuscation"? In the context of programming, obfuscation or Code Obfuscation is the practice of making the source code of an application difficult for humans to understand while still allowing it to function correctly when executed by a c...10 likes·114 readsPython
Sam Russellwww.lodsb.com·Aug 18, 2023Control Flow Flattening: How to build your ownI was really really excited when Open Obfuscator was launched. I've enjoyed the challenges that application obfuscation have given us over the years, and it was fun to find a well documented and open source obfuscator that we could play with and try ...10 likes·1.7K readsreverse engineering
Sam Russellwww.lodsb.com·Aug 3, 2023Removing Control Flow Flattening with Binary NinjaIf you've been reversing for a while then eventually you'll come up against a control flow graph that looks like this: This is a simple toy app hosted at https://github.com/samrussell/cff_playground if you feel like following along at home. The plug...10 likes·2.1K readsreverse engineering
Hung Ngohungoboss.hashnode.dev·Jul 20, 2023XSS and how JSFuck just f*cked my brainThe digital age has brought with it numerous advantages, but also new security threats. XSS, which stands for “Cross-Site Scripting”, has been one of the most frequent issues in the OWASP Top 10. One of the ways we can combat XSS is to properly sanit...1 like·74 readsexploit
Tawanda Nyahuyetowernter.hashnode.dev·Feb 6, 2023How to view .Net application source code and hiding itHave you ever liked an application to the point that you want to view its source code? Well, I have been there. For .Net executable files and libraries such as DLL files, viewing the source code is a piece of cake as long as the code is not obfuscate...73 readsdotnet
Kiran Kuyatekiran2157.hashnode.dev·Dec 25, 2022Javascript obfustication and Re-obfusticationJavascript is an interpreted and lightweight programming language which will be found in most Dynamic websites. It’s one of the most recognized languages in web development. It has a variety of use cases, which can vary from animating some elements t...1 like·202 readsJavascript obfustication
Felix Kariukifelixkariuki.hashnode.dev·Sep 29, 2022Code shrinking and obfuscation Using R8 in AndroidCode shrinking and obfuscation helps you to significantly reduce the size of your application. Enabling shrinking, you benefit from obfuscation, which shortens the names of your app’s classes and members, and optimization, which applies more aggressi...78 readscode shrinking