From Manuscript to Distribution: The Complete Process of Publishing Your Own Technical Book
When it comes to writing a book, the first decision that needs to be made is whether to seek publication or to self-publish. Each option has its benefits and
Mastering Technical Talks: Techniques for Effective Communication
As a technical expert, you’ve spent countless hours perfecting your craft, gaining knowledge, and developing innovative ideas. Yet, to be successful, it’s not enough to be a subject matter
Using Machine Learning To Identify Malware On Android Devices
Getting Started This article walks through the process of extracting Android applications from an un-rooted device, reverse engineering those applications, and using auxiliary tools such as automation frameworks and malware
Using Machine Learning to Identify Far-Right Extremism
This article discusses topics of extremism and radicalisation. Due to this; text, themes, and content relating to far-right extremism are present in this article. Please continue with care. See
A reverse engineer’s post-mortem of the Houseparty video chat app
Some people might remember the video chat application Houseparty. Similar to others like Zoom, Skype, and What’s App, it provided light-hearted group video chat functionality alongside games and entertainment activities.
Android Malware Reverse Engineering
This article covers the building blocks of Android malware analysis, getting you ready to go, with everything needed when it comes to reverse engineering malware on Android! Types of
Reverse Engineering the Google Play SafetyNet Attestation API
Let’s start things off with a question; what does the TV show Black Mirror, the series Person of Interest, and Android Google Play devices all have in common? Well
Android Obfuscation (ProGuard and R8)
The most common tools used for obfuscation in Android include ProGuard, DexGuard and R8. For most of this article the terms R8, DexGuard, and ProGuard will be used interchangeably
An Introduction To Reverse Engineering Android Games (via Jadx)
During this article we’re going to take a whistle stop tour of Android reverse engineering to get you to the stage of being able to take apart and review
Programmatic Access To Application Components (Android Reflection)
Reflection is one of the many aces up the sleeve when it comes to taking apart Android applications and getting them running in a state that suits you. To
Android Application IPC (Android Intents)
Android is saturated with Inter Process Communication (IPC) mechanisms used for both cross system and process communication (i.e. Binder, Sockets, and IOCTL calls) and for inter application communication (i.e.