Latest posts
- How I Reversed Amazon's Kindle Web Obfuscation Because Their App SuckedOct 15, 2025Pixelmelt
As it turns out they don't actually want you to do this (and have some interesting ways to stop you)
- Building The Language Model Nobody Asked ForAug 27, 2025Pixelmelt
I lied in the title, well, sort of. Nobody explicitly asked for this but the signs were always there.
- Defeating DevTools DetectionJul 22, 2025Ciarán
Bypassing anti-debugging detection techniques when analysing potentially malicious websites, no matter the site.
- Attacking a stack based JavaScript virtual machineJul 16, 2025Ciarán
Analysing Pixelmelt's Javascript Virtualisation Obfuscation - A Research Study
- A Clever (but not so good) Scraper ProtectionJun 03, 2025Pixelmelt
Text obfuscation with no JavaScript? How?
- Try-Catch Control Flow ObfuscationMar 04, 2025Pixelmelt
JavaScript exception handling can be exploited to create non-linear code flow that confuses analysis.
- Overview of JavaScript Virtualization ObfuscationFeb 13, 2025Pixelmelt
Notes on virtualization obfuscation of JavaScript.
- Javascript obfuscation tricksDec 03, 2024Pixelmelt
JavaScript quirks that can be used for obfuscation.
- Cloning your Discord friends with Large Language ModelsJan 20, 2024Pixelmelt
Did it work well and is it useful in any way? No. Is it hilarious to mess around with and does it mimic them well? Yes.