You can also search by tags
Analyzing the Xubuntu website compromise and clipboard hijacker malware
Reverse engineering a clipboard hijacker distributed through compromised Xubuntu torrent downloads
You can also search by tags
Reverse engineering a clipboard hijacker distributed through compromised Xubuntu torrent downloads
Exploring how the Kindle Web Reader fetches DRM-protected content and how to capture the rendered pages automatically.
A practical guide to exploring, modifying, and understanding Electron apps by unpacking and repacking ASAR archives.
Reverse engineering analysis of Xochitl, reMarkable’s proprietary user interface. Exploration of the thumbnail generation system, discovery of undocumented APIs (/thumbnail and /search), and detailed analysis of the document rendering process using IDA Pro.
Breaking down a macOS app’s licensing system - from watermark removal to key generation
Reverse engineering analysis of RootsMagic’s license validation system, revealing the custom Base32 encoding scheme, 60-bit data structure, and proprietary checksum algorithm used for offline license verification.
A Python scraper that converts French math exercises from Bibmath.net into LaTeX format for PDF generation.
Master PDF Editor patch analysis
Leech license patch analysis
A Python project that fetches your followed Apple Music artists and automatically adds them as RSS feeds in FreshRSS using RSS-Bridge