An application platform honed by attackers

Photo by Asa Rodger

Screenshot of Hackium and the REPL

with shift-refactor and shift-interpreter

Puppeteering for fun and outerwear

The result of one week of deepfake experimentation

How easy is it to create a deepfake?

Photo by Samuel Zeller on Unsplash

Get started with Node & GCP

Transform, manipulate, and deobfuscate JavaScript with shift-refactor

$ npm install shift-refactor

What does shift-refactor do?

Image courtesy of

An attacker allegedly gained access to an npm user account and published modules that broke dependents. But why?

How to use parsers and other tools to analyze JavaScript

Jarrod Overson

I write about JavaScript, Reverse Engineering, Security, and Credential Stuffing. Also a speaker, O'Reilly Author, creator of Plato, Director at Shape Security.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store