Analyzing the Xubuntu website compromise and clipboard hijacker malware
Reverse engineering a clipboard hijacker distributed through compromised Xubuntu torrent downloads
Reverse engineering a clipboard hijacker distributed through compromised Xubuntu torrent downloads
Exploring how the Kindle Web Reader fetches DRM-protected content and how to capture the rendered pages automatically.
A practical guide to exploring, modifying, and understanding Electron apps by unpacking and repacking ASAR archives.
Reverse engineering analysis of Xochitl, reMarkable’s proprietary user interface. Exploration of the thumbnail generation system, discovery of undocumented APIs (/thumbnail and /search), and detailed analysis of the document rendering process using IDA Pro.
Breaking down a macOS app’s licensing system - from watermark removal to key generation
Reverse engineering analysis of RootsMagic’s license validation system, revealing the custom Base32 encoding scheme, 60-bit data structure, and proprietary checksum algorithm used for offline license verification.
Master PDF Editor patch analysis
Leech license patch analysis