Reversing Castle's X-Castle-Request-Token on Android
A deep dive into Castle.io's Android SDK, reverse engineering the X-Castle-Request-Token generation through Frida hooks and JADX decompilation - including all the wrong turns
Read more →A deep dive into Castle.io's Android SDK, reverse engineering the X-Castle-Request-Token generation through Frida hooks and JADX decompilation - including all the wrong turns
Read more →In part 1 of this blog series, we will be deobfuscating and decrypting the payloads of a seemingly custom anti-bot solution on an app called MelBet/1xbet. Deobfuscation will be done in GoLang using a fork of go-fAST!
Read more →In part 2 of this blog series, we will be creating a full GoLang solver of the CoinMarketCap mobile captcha!
Read more →In part 1 of this blog series, we will be deobfuscating and reverse engineering the code responsible for the captcha on the CoinMarketCap mobile app.
Read more →In this post we will be both reverse engineering and making a GoLang script to process the UI_Mentrics JavaScript challenge on Twitter!
Read more →In part 3 we are going to be making a GoLang API to generate the X-Client-Transaction-Id header!
Read more →I part 2 we are going to begin reverse engineering the X-Client-Transaction-Id header!
Read more →In part 1 we will be deobfuscating the twitter X-Client-Transaction-Id script!
Read more →In this part we will be porting all of the PX code to GoLang to make our own generator!
Read more →An introduction to the PerimeterX SDK
Read more →