shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

277
active users

#deobfuscation

0 posts0 participants0 posts today
void<p>Reverse Engineering Tiktok's VM Obfuscation (Part 1)</p><p>Dropped a new blog post where I detail the start of my journey into TikTok's VM based obfuscation.</p><p>So far only covers the discovery of the script and how I dumped strings from each "program"</p><p><a href="https://nullpt.rs/reverse-engineering-tiktok-vm-1" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nullpt.rs/reverse-engineering-</span><span class="invisible">tiktok-vm-1</span></a></p><p><a href="https://infosec.exchange/tags/tiktok" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tiktok</span></a> <a href="https://infosec.exchange/tags/vm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vm</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://infosec.exchange/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a> <a href="https://infosec.exchange/tags/deobfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deobfuscation</span></a></p>
void<p>Hi! Figured I would show everyone what I've been working on for my introduction. Looking forward to making tons of friends here :)</p><p>Been reverse-engineering TikTok / Douyin's VM based web security in my free time. Got to a point where I'm able to extract strings from the bytecode. Here's a few cool dumps</p><p><a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://infosec.exchange/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a> <a href="https://infosec.exchange/tags/deobfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deobfuscation</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a></p>