An application platform honed by attackers


Photo by Asa Rodger



Screenshot of Hackium and the REPL

with shift-refactor and shift-interpreter


Puppeteering for fun and outerwear


The result of one week of deepfake experimentation

How easy is it to create a deepfake?


Photo by Samuel Zeller on Unsplash

Get started with Node & GCP


Transform, manipulate, and deobfuscate JavaScript with shift-refactor

$ npm install shift-refactor

What does shift-refactor do?


Image courtesy of https://unsplash.com/photos/B4op5oZ4x5Q

An attacker allegedly gained access to an npm user account and published modules that broke dependents. But why?


How to use parsers and other tools to analyze JavaScript

Jarrod Overson

I write about JavaScript, Reverse Engineering, Security, and Credential Stuffing. Also a speaker, O'Reilly Author, creator of Plato, Director at Shape Security.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store