Explore >> Select a destination


You are here

yasoob.me
| | blog.securityinnovation.com
3.7 parsecs away

Travel
| | Connected devices make up one of the largest attack surfaces. Learn how researchers extract firmware for analysis by reverse engineering updater apps.
| | www.corellium.com
3.8 parsecs away

Travel
| | iOS applications are distributed as compiled binaries and are not readable by default. Click the blog to learn what goes into iOS reverse engineering.
| | insinuator.net
3.8 parsecs away

Travel
| | This is a write-up about how to use Frida to dump documents from a process after they have been loaded and decrypted. It's a generic and very effective approach demonstrated on a piece of software from North Korea. Some time ago we received an ISO file which was a dump of a CD-ROM from North Korea. The only information we got was that it included a document viewer and various PDF docume ...
| | linuxjedi.co.uk
34.5 parsecs away

Travel
| Whilst migrating from wordpress.com to an installation of the open source WordPress, I hit some gotchas that I couldn't easily find information about elsewhere.