void<p>Reverse Engineering Tiktok's VM Obfuscation (Part 1)</p><p>Dropped a new blog post where I detail the start of my journey into TikTok's VM based obfuscation.</p><p>So far only covers the discovery of the script and how I dumped strings from each "program"</p><p><a href="https://nullpt.rs/reverse-engineering-tiktok-vm-1" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nullpt.rs/reverse-engineering-</span><span class="invisible">tiktok-vm-1</span></a></p><p><a href="https://infosec.exchange/tags/tiktok" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tiktok</span></a> <a href="https://infosec.exchange/tags/vm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vm</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://infosec.exchange/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a> <a href="https://infosec.exchange/tags/deobfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deobfuscation</span></a></p>