Trickster Dev
About
RSS
tags
code
Posts
Security
Katana: web crawler for offensive security and web exploration
Simple ways to find exposed sensitive information
SSH tips and tricks
Setting up mitmproxy with iOS 17.1
Restringer: modular JavaScript deobfuscator
Self-defending JS code and debugger traps
Abusing Ahrefs Backlink Checker
Don’t JSFuck with me: Part 3
Understanding JavaScript packers
How do they (try to) block bots: a broad review of automation countermeasures
Don’t JSFuck with me: Part 2
Don’t JSFuck with me: Part 1
Understanding HTTP/2 fingerprinting
JavaScript AST manipulation with Babel: reducing nestedness, unflattening the CFG
JavaScript AST manipulation with Babel: reducing indirection, undoing string concealing
JavaScript AST manipulation with Babel: constant folding and propagation
JavaScript AST manipulation with Babel: AST modification APIs
JavaScript AST manipulation with Babel: untangling scope confusion
JavaScript AST manipulation with Babel: 3 ways to create nodes and subtrees
JavaScript AST manipulation with Babel: transform prototyping and plugin development
Understanding SPF, DKIM, DMARC for email security and deliverability
Axiom: just-in-time dynamic infra for offensive security operations
Active DNS recon techniques
Passive DNS recon techniques
Recon-ng: modular framework for OSINT automation
JavaScript AST manipulation with Babel: removing unreachable code
Decompiling Android apps
JavaScript AST manipulation with Babel: the first steps
Javascript obfuscation techniques by example
Understanding TLS fingerprinting
Understanding Abstract Syntax Trees
Notes from The Bug Hunters Methodology - Application Analysis v1
Scapy: low level packet hacking toolkit for Python
Notes on TBHM v4 recon edition
SMTP user enumeration for fun and profit
Decrypting your own HTTPS traffic with Wireshark
Sending notifications programmatically: let me count the ways
Setting up mitmproxy with Android
Setting up mitmproxy with iOS 15
Automating Google Dorking
How does PerimeterX Bot Defender work
Trickster Dev
Code level discussion of web scraping, gray hat automation, growth hacking and bounty hunting