Research
members

Account Takeover via browsable intent filter in Android app

Ovi
Ovi
Mobile app security is an interesting field; since app sandbox restrictions are very good, finding security issues can be extremely hard. Once you start delving into applications more and more,…
instructSOCIETY | Visual programming of malware tutorial & project files // part 2
Journal

instructSOCIETY | Visual programming of malware tutorial & project files // part 2

Ovi
Ovi
instructSOCIETY | Malware digraphs & modelling // part 1
Journal
members

instructSOCIETY | Malware digraphs & modelling // part 1

Ovi
Ovi
RE:archive | APT37's ROKRAT HWP Object Linking and Embedding
REarchive
members

RE:archive | APT37's ROKRAT HWP Object Linking and Embedding

Ovi
Ovi
Research
members

RE:privacy | Glow Fertility women's health app - IDOR vulnerability leads to 25 million userbase dataleak

Ovi
Ovi
Summary As part of the RE:privacy project, I am reverse engineering and hacking reproductive health apps to interrogate the security and privacy of these products. You can find out…
RE:privacy | REVERSE ENGINEERING FOR PRIVACY RIGHTS
REprivacy
members

RE:privacy | REVERSE ENGINEERING FOR PRIVACY RIGHTS

Ovi
Ovi
Journal
members

Government intervention on Mastodon & the fediverse. Matters of security, privacy & sustainability.

Ovi
Ovi
The great migration was a poignant part of internet history. When Elon took over Twitter, now X, many people migrated over to Mastodon. It was beautiful to see the mass…
Newsletter
members

[0x0v1] Newsletter | Hacktivist Field Guide: Reverse engineering [Part 2]

Ovi
Ovi
Newsletter
members

[0x0v1] Newsletter | Hacktivist Field Guide: Reverse engineering [Part 1]

Ovi
Ovi
"The Techno-Optimist Manifesto" is proof tech VCs don't have the answers
Journal
members

"The Techno-Optimist Manifesto" is proof tech VCs don't have the answers

Ovi
Ovi