Jan. 15, 2026
Reverse Engineering JVM Applications: A Methodology Overview
A high-level look at the methodology I use when analyzing Java applications for security vulnerabilities, from bytecode inspection to dynamic instrumentation.
Technical writeups on security research, reverse engineering methodologies, and secure development practices.
A high-level look at the methodology I use when analyzing Java applications for security vulnerabilities, from bytecode inspection to dynamic instrumentation.
Practical considerations for integrating security into backend development workflows, from threat modeling to secure coding patterns.