YARA Rules in a Nutshell
#cybersecuritytools #cybersecurity #malwareanalysis #bloggingfellowship #yararules #reverseengineering #hackernoontopstory #security
https://hackernoon.com/yara-rules-in-a-nutshell-kev3735
#cybersecuritytools #cybersecurity #malwareanalysis #bloggingfellowship #yararules #reverseengineering #hackernoontopstory #security
https://hackernoon.com/yara-rules-in-a-nutshell-kev3735
Hackernoon
YARA Rules in a Nutshell | HackerNoon
YARA rules can be used to help researchers identify and classify malware samples. They are beneficial for reverse engineering or during an incident response.
A Guide to Examining & Modifying Executable Code
#c #reverseengineering #coding #learningtocode #codequality #codereview #binarysearch #testing
https://hackernoon.com/a-guide-to-examining-modifying-executable-code
#c #reverseengineering #coding #learningtocode #codequality #codereview #binarysearch #testing
https://hackernoon.com/a-guide-to-examining-modifying-executable-code
Hackernoon
A Guide to Examining & Modifying Executable Code | HackerNoon
A review of tools and techniques to examine and modify executable.
Secure Your Next.js Apps with Jscrambler
#javascript #security #nextjs #webdevelopment #js #nextjs #jscrambler #reverseengineering
https://hackernoon.com/secure-your-nextjs-apps-with-jscrambler
#javascript #security #nextjs #webdevelopment #js #nextjs #jscrambler #reverseengineering
https://hackernoon.com/secure-your-nextjs-apps-with-jscrambler
Hackernoon
Secure Your Next.js Apps with Jscrambler | HackerNoon
In this article, we’ll look at how you can integrate Jscrambler into your Next.js app development workflow.
Reversing a NodeJS Malware and Finding its Author
#javascript #nodejs #malware #reverseengineering #reversednodejsmalware #nodejsmalware #obfuscatedcode #piratestealer #webmonetization
https://hackernoon.com/reversing-a-nodejs-malware-and-finding-its-author
#javascript #nodejs #malware #reverseengineering #reversednodejsmalware #nodejsmalware #obfuscatedcode #piratestealer #webmonetization
https://hackernoon.com/reversing-a-nodejs-malware-and-finding-its-author
Hackernoon
Reversing a NodeJS Malware and Finding its Author
Reverse engineering a NodeJS Discord malware and exposing the authors by finding the webhook they used.
5 Popular Professions in Cybersecurity
#cybersecurity #cybersecurityjobs #itprofessionals #reverseengineering #securitysystem #securitytesting #cybersecurity #informationsecurity #webmonetization
https://hackernoon.com/5-popular-professions-in-cybersecurity
#cybersecurity #cybersecurityjobs #itprofessionals #reverseengineering #securitysystem #securitytesting #cybersecurity #informationsecurity #webmonetization
https://hackernoon.com/5-popular-professions-in-cybersecurity
Hackernoon
5 Popular Professions in Cybersecurity | HackerNoon
Cybersecurity jobs are valuable in 2022 because of an increased number of hacks. Among the top cybersecurity jobs are anti-fraud analyst and reverse engineer.
APK Decompilation: A Beginner's Guide for Reverse Engineers
#reverseengineering #android #java #opensource #debugging #apkdecompilation #reverseengineers #jadx
https://hackernoon.com/apk-decompilation-a-beginners-guide-for-reverse-engineers
#reverseengineering #android #java #opensource #debugging #apkdecompilation #reverseengineers #jadx
https://hackernoon.com/apk-decompilation-a-beginners-guide-for-reverse-engineers
Hackernoon
APK Decompilation: A Beginner's Guide for Reverse Engineers
APK decompilation is the process of reverse engineering an APK file to retrieve its source code. It is useful for understanding how an Android app works.
Taking a Look under the Hood to See How Jest Finds Related Tests
#jest #testing #unittesting #algorithms #javascript #javascriptframeworks #reverseengineering
https://hackernoon.com/taking-a-look-under-the-hood-to-see-how-jest-finds-related-tests
#jest #testing #unittesting #algorithms #javascript #javascriptframeworks #reverseengineering
https://hackernoon.com/taking-a-look-under-the-hood-to-see-how-jest-finds-related-tests
Hackernoon
Taking a Look under the Hood to See How Jest Finds Related Tests | HackerNoon
Learn how Jest finds related tests in an optimal way using the Breadth First Search (BFS) algorithm and how to leverage its API in your local development enviro
Reverse Engineer LED Lights with Python to Convert your Computer Monitor to an Ambient Monitor
#python #programming #reverseengineering #tutorial #hackernoontopstory #reverseengineerledlights #converttoambientmonitor #ambientmonitor #hackernoones #hackernoonhi #hackernoonzh #hackernoonvi #hackernoonfr #hackernoonpt #hackernoonja
https://hackernoon.com/reverse-engineer-led-lights-with-python-to-convert-your-computer-monitor-to-an-ambient-monitor
#python #programming #reverseengineering #tutorial #hackernoontopstory #reverseengineerledlights #converttoambientmonitor #ambientmonitor #hackernoones #hackernoonhi #hackernoonzh #hackernoonvi #hackernoonfr #hackernoonpt #hackernoonja
https://hackernoon.com/reverse-engineer-led-lights-with-python-to-convert-your-computer-monitor-to-an-ambient-monitor
Hackernoon
Reverse Engineer LED Lights with Python to Convert your Computer Monitor to an Ambient Monitor | HackerNoon
Tutorial on how to reverse engineer bluetooth lights in Python transform your computer monitor to be an Ambient Monitor
How to Reverse Engineer a Drone With Wireshark Using Packet Dissection
#uavs #cybersecurity #drones #reverseengineering #aerospace #technology #ethicalhacking #hackernoontopstory #hackernoones #hackernoonhi #hackernoonzh #hackernoonvi #hackernoonfr #hackernoonpt #hackernoonja
https://hackernoon.com/how-to-reverse-engineer-a-drone-with-wireshark-using-packet-dissection
#uavs #cybersecurity #drones #reverseengineering #aerospace #technology #ethicalhacking #hackernoontopstory #hackernoones #hackernoonhi #hackernoonzh #hackernoonvi #hackernoonfr #hackernoonpt #hackernoonja
https://hackernoon.com/how-to-reverse-engineer-a-drone-with-wireshark-using-packet-dissection
Hackernoon
How to Reverse Engineer a Drone With Wireshark Using Packet Dissection
A cybersecurity research article diving into reverse engineering DJI drone communication protocol systems using Wireshark
Unveiling Security Vulnerabilities in Mobile Apps
#mobiledebugging #mobileappdevelopment #reverseengineering #osflaws #flawsinprocessors #androidappsecurity #securedatastorage #security #webmonetization #hackernoones #hackernoonhi #hackernoonzh #hackernoonvi #hackernoonfr #hackernoonpt #hackernoonja
https://hackernoon.com/unveiling-security-vulnerabilities-in-mobile-apps
#mobiledebugging #mobileappdevelopment #reverseengineering #osflaws #flawsinprocessors #androidappsecurity #securedatastorage #security #webmonetization #hackernoones #hackernoonhi #hackernoonzh #hackernoonvi #hackernoonfr #hackernoonpt #hackernoonja
https://hackernoon.com/unveiling-security-vulnerabilities-in-mobile-apps
Hackernoon
Unveiling Security Vulnerabilities in Mobile Apps | HackerNoon
Mobile debugging is not limited to developers; even as a user, you can contribute to protecting millions of users worldwide.
How I Hacked and Turned My CASIO F-91W Into a Contactless Payment Device
#hacking #rfidandnfcdevice #reverseengineering #casio #proxmark3 #nanovna #rfidrc522 #hackernoontopstory #hackernoones #hackernoonhi #hackernoonzh #hackernoonvi #hackernoonfr #hackernoonpt #hackernoonja
https://hackernoon.com/how-i-hacked-and-turned-my-casio-f-91w-into-a-contactless-payment-device
#hacking #rfidandnfcdevice #reverseengineering #casio #proxmark3 #nanovna #rfidrc522 #hackernoontopstory #hackernoones #hackernoonhi #hackernoonzh #hackernoonvi #hackernoonfr #hackernoonpt #hackernoonja
https://hackernoon.com/how-i-hacked-and-turned-my-casio-f-91w-into-a-contactless-payment-device
Hackernoon
How I Hacked and Turned My CASIO F-91W Into a Contactless Payment Device | HackerNoon
Bringing NFC contactless payment capability to a true classic.
Creating Cheats for Dead Cells Using Unsafe Rust
#videogames #reverseengineering #ethicalhacking #videogamehacks #deadcells #gamedevelopment #gamehacking #rusttutorial
https://hackernoon.com/creating-cheats-for-dead-cells-using-unsafe-rust
#videogames #reverseengineering #ethicalhacking #videogamehacks #deadcells #gamedevelopment #gamehacking #rusttutorial
https://hackernoon.com/creating-cheats-for-dead-cells-using-unsafe-rust
Hackernoon
Creating Cheats for Dead Cells Using Unsafe Rust | HackerNoon
Learn how to create a Dead Cells cheat using memory manipulation techniques.
Virus.DOS.Kuku: Recreating MS-DOS Malware in Python.
#malware #retro #programming #linux #windows10 #computervirus #reverseengineering #python
https://hackernoon.com/virusdoskuku-recreating-ms-dos-malware-in-python
#malware #retro #programming #linux #windows10 #computervirus #reverseengineering #python
https://hackernoon.com/virusdoskuku-recreating-ms-dos-malware-in-python
Hackernoon
Virus.DOS.Kuku: Recreating MS-DOS Malware in Python. | HackerNoon
Reverse engineering the kuku virus in Python and how I did it.
How To Hack Cheap Car Parking Sensors With Arduino and an Oscilloscope
#robotics #arduino #pwmsignals #ultrasonicsensors #reverseengineering #sensordatadecoding #howtohackparkingsensors #roboticsprojectforbeginners
https://hackernoon.com/how-to-hack-cheap-car-parking-sensors-with-arduino-and-an-oscilloscope
#robotics #arduino #pwmsignals #ultrasonicsensors #reverseengineering #sensordatadecoding #howtohackparkingsensors #roboticsprojectforbeginners
https://hackernoon.com/how-to-hack-cheap-car-parking-sensors-with-arduino-and-an-oscilloscope
Hackernoon
How To Hack Cheap Car Parking Sensors With Arduino and an Oscilloscope | HackerNoon
Learn how to reverse engineer and utilize the cheapest waterproof ultrasonic sensors on the market for your robotics projects.
Binary Size in Go Applications: How to Use Go-size-analyze
#golang #optimization #binary #reverseengineering #bianrysize #golangsize #golanghugebinary #gosizeanalyzer
https://hackernoon.com/binary-size-in-go-applications-how-to-use-go-size-analyze
#golang #optimization #binary #reverseengineering #bianrysize #golangsize #golanghugebinary #gosizeanalyzer
https://hackernoon.com/binary-size-in-go-applications-how-to-use-go-size-analyze
Hackernoon
Binary Size in Go Applications: How to Use Go-size-analyze
Go is known for its simplicity and efficiency, but as projects grow in size, so can the binaries.
Building a Level Viewer for The Legend Of Zelda - Twilight Princess
#reverseengineering #bmd #gamedevelopment #thelegendofzelda #leveldesign #webbmdviewer #levelviewerforzeldagame #hackernoontopstory
https://hackernoon.com/building-a-level-viewer-for-the-legend-of-zelda-twilight-princess
#reverseengineering #bmd #gamedevelopment #thelegendofzelda #leveldesign #webbmdviewer #levelviewerforzeldagame #hackernoontopstory
https://hackernoon.com/building-a-level-viewer-for-the-legend-of-zelda-twilight-princess
Hackernoon
Building a Level Viewer for The Legend Of Zelda - Twilight Princess | HackerNoon
I programmed a web BMD viewer for Twilight Princess because I am fascinated by analyzing levels and immersing myself in the details of how they were made.
The Noonification: The DevOps Paradox: A Shift Away From Ops (8/3/2024)
#noonification #hackernoonnewsletter #latesttectstories #datasecurity #reverseengineering #bitcoin #devops #reactjs
https://hackernoon.com/8-3-2024-noonification
#noonification #hackernoonnewsletter #latesttectstories #datasecurity #reverseengineering #bitcoin #devops #reactjs
https://hackernoon.com/8-3-2024-noonification
Hackernoon
The Noonification: The DevOps Paradox: A Shift Away From Ops (8/3/2024) | HackerNoon
8/3/2024: Top 5 stories on the HackerNoon homepage!
How I Hacked a Colorfit Pro 4
#smartwatch #ble #reverseengineering #hacking #python #penetrationtesting #cybersecurity #iot
https://hackernoon.com/how-i-hacked-a-colorfit-pro-4
#smartwatch #ble #reverseengineering #hacking #python #penetrationtesting #cybersecurity #iot
https://hackernoon.com/how-i-hacked-a-colorfit-pro-4
Hackernoon
How I Hacked a Colorfit Pro 4
How I hacked Colorfit pro 4 is a blog where I (iamatulsingh) shared how and why I did that.
A Pentester Took Apart a Website’s Code to Prove It Was Totally Pointless
#cybersecurity #programming #python #burpsuite #javascript #reverseengineering #security #hackernoontopstory
https://hackernoon.com/a-pentester-took-apart-a-websites-code-to-prove-it-was-totally-pointless
#cybersecurity #programming #python #burpsuite #javascript #reverseengineering #security #hackernoontopstory
https://hackernoon.com/a-pentester-took-apart-a-websites-code-to-prove-it-was-totally-pointless
Hackernoon
A Pentester Took Apart a Website’s Code to Prove It Was Totally Pointless
In this article, I'll walk you through how to reverse-engineer Javascript code and show you how to write my Burp Suite extension in practice.