Explore >> Select a destination


You are here

yasoob.me
| | yepoleb.github.io
3.8 parsecs away

Travel
| | [AI summary] This article details the reverse engineering process of the Austrian ID-card verification app to understand its API and encryption methods, aiming for an open-source implementation.
| | www.corellium.com
4.0 parsecs away

Travel
| | iOS applications are distributed as compiled binaries and are not readable by default. Click the blog to learn what goes into iOS reverse engineering.
| | blog.dixitaditya.com
4.1 parsecs away

Travel
| | Intercepting and Manipulating client-side AES encrypted traffic in mobile applications having hardcoded Key and IV
| | www.malwaretech.com
16.4 parsecs away

Travel
| It seems that the bootstrap code is just scattered around various memory addresses and there's no simple way to dump all of it, so i decided to just dump a chunk of memory from 0x00000000 and look for any reference to addresses outside of that chunk (allowing me to build up a basic map of the code). Although the exact addresses vary between disk models, my layout should give you a good idea where to look.