Apr
01

From Manuscript to Distribution: The Complete Process of Publishing Your Own Technical Book

  When it comes to writing a book, the first decision that needs to be made is whether to seek publication or to self-publish. Each option has its benefits and

Apr
01

Mastering Technical Talks: Techniques for Effective Communication

  As a technical expert, you’ve spent countless hours perfecting your craft, gaining knowledge, and developing innovative ideas. Yet, to be successful, it’s not enough to be a subject matter

May
08

Using Machine Learning To Identify Malware On Android Devices

Getting Started This article walks through the process of extracting Android applications from an un-rooted device, reverse engineering those applications, and using auxiliary tools such as automation frameworks and malware

Apr
22

Using Machine Learning to Identify Far-Right Extremism

  This article discusses topics of extremism and radicalisation. Due to this; text, themes, and content relating to far-right extremism are present in this article. Please continue with care. See

Apr
20

A reverse engineer’s post-mortem of the Houseparty video chat app

  Some people might remember the video chat application Houseparty. Similar to others like Zoom, Skype, and What’s App, it provided light-hearted group video chat functionality alongside games and entertainment activities.

Apr
14

Android Malware Reverse Engineering

  This article covers the building blocks of Android malware analysis, getting you ready to go, with everything needed when it comes to reverse engineering malware on Android!  Types of

Apr
07

Reverse Engineering the Google Play SafetyNet Attestation API

  Let’s start things off with a question; what does the TV show Black Mirror, the series Person of Interest, and Android Google Play devices all have in common? Well

Apr
03

Android Obfuscation (ProGuard and R8)

  The most common tools used for obfuscation in Android include ProGuard, DexGuard and R8. For most of this article the terms R8, DexGuard, and ProGuard will be used interchangeably

Mar
30

An Introduction To Reverse Engineering Android Games (via Jadx)

  During this article we’re going to take a whistle stop tour of Android reverse engineering to get you to the stage of being able to take apart and review

Jan
10

Programmatic Access To Application Components (Android Reflection)

  Reflection is one of the many aces up the sleeve when it comes to taking apart Android applications and getting them running in a state that suits you. To

Jan
03

Android Application IPC (Android Intents)

  Android is saturated with Inter Process Communication (IPC) mechanisms used for both cross system and process communication (i.e. Binder, Sockets, and IOCTL calls) and for inter application communication (i.e.