
Reversing Android Apps
This is a quick reference for how I usually approach reverse engineering Android apps for the purposes of research, pentesting, bug bounty, etc. I plan to write a more in-depth guide at some point in the future. ...
This is a quick reference for how I usually approach reverse engineering Android apps for the purposes of research, pentesting, bug bounty, etc. I plan to write a more in-depth guide at some point in the future. ...
Below is a list of tools, articles, and research related to de-anonymization, as well as some anonymization specific tooling designed to counter de-anonymization methods. This list will grow as I come across more things. ...
“A new ignorance is on the horizon, an ignorance borne not of a lack of knowledge but of too much knowledge, too much data, too many theories, too little time.” – Eugene Thacker ...
Quick reference for installing the TCXO on a HackRF One. ...
I’ve been wanting to install Arch on my primary workstation for a while though I was pretty overwhelmed with figuring out what sort of configuration I wanted. I now have something that I like and wanted to outline what I did. This is mostly for my own reference and documentation, though please feel free to use this and adapt it to your own needs! This guide will outline how to setup a clean install of Arch linux with the following: Secure Boot. LUKS + BTRFS with subvolumes. AppArmor. systemd-boot. TPM 2.0 enrollment for LUKS. GNOME 42 w/ Wayland and NVIDIA proprietary driver. ...