PinnedX (former Twitter) Login flow reconstruction. Episode 1 — Headers generationFirst post of a serie about X / Twitter login automatisation. In this episode I’m going to reverse engeener all the required headersJan 13A clap icon1A response icon1Jan 13A clap icon1A response icon1
PinnedBreaking Down Datadome Captcha WAFLet’s break down step-by-step the latest Datadome Captcha / Geetest WAF with the goal of accessing websites protected by itMay 26, 2025A clap icon72A response icon2May 26, 2025A clap icon72A response icon2
PinnedNavigating JavaScript Security: Recompiling Firefox to Bypass Anti-Debugger TechniquesExplore the innovative approach of recompiling Firefox to bypass JavaScript anti-debugger techniques.Jan 20, 2024A clap icon54Jan 20, 2024A clap icon54
X (former Twitter) Login flow reconstruction. Episode 2 — UI MetricsThis is my second episode about the login X / Twitter flow. Let’s solve the ui_metrics.2d ago2d ago
Analyzing Datadome latest changesOnce in a while Datadome actually implement something new, I always hope into a spicy situation, but this (again) seems not to be the case.Jan 21A clap icon2Jan 21A clap icon2
Using iCloud+ subscription as its bestThe feature I love the most of iCloud+ is the “HideMyEmail”, that creates you an alias during website registrations in order to prevent…Jan 6Jan 6
How I Track Support Tickets with a Simple Channel Marker BotManaging support tickets in Discord gets messy fast. Threads pile up, people don’t respond, and some channels sit idle even though they…Apr 16, 2025A clap icon18Apr 16, 2025A clap icon18
Akamai v3 Sensor Data: Deep Dive into Encryption, Decryption, and Bypass ToolsUnderstanding and bypassing Akamai’s bot protection can feel a real pain due to its complexity. This deep dive provides a clear…Apr 7, 2025A clap icon57A response icon4Apr 7, 2025A clap icon57A response icon4
Daily hCaptcha Challenges — Chap. 2If you haven’t read Chap. 1 yet, I highly recommend you start there. In this chapter, we analyse a different dynamic hCaptcha challenge.Apr 1, 2025Apr 1, 2025
Breaking Down a Unique Anti-Bot MeasureWhile working on automating car searches for DiscoverCars, I stumbled upon a fascinating — and somewhat unusual — security measure…Mar 21, 2025A clap icon50A response icon2Mar 21, 2025A clap icon50A response icon2
Daily hCaptcha Challenges — Chap. 1I’ve recently went across the hCaptcha captcha after years away from it, due to a work for a client. Here’s a part of the study I’ve done…Mar 13, 2025A response icon1Mar 13, 2025A response icon1
Breaking Down the Incapsula’s ___utmvc CookieThe ___utmvc cookie from Incapsula, a throwback to an earlier era of web security that’s still floating around on some sites todayJan 17, 2025Jan 17, 2025
How to Compile and Distribute Windows EXE from macOSDiscover how to use Wine to compile and distribute Windows executables directly from your macOS.Apr 17, 2024A response icon1Apr 17, 2024A response icon1
Understanding HTTP: Evolution Across VersionsFrom the early days of the World Wide Web, spearheaded by Tim Berners-Lee at CERN, to the modern intricacies of HTTP/3, the Hypertext…Mar 17, 2024A clap icon3Mar 17, 2024A clap icon3
Introducing ContentPrime: The Future of SEO-Optimized Content CreationIn the fast-evolving digital landscape, where content is king, the challenge of standing out amidst the endless sea of information has…Mar 11, 2024A clap icon3Mar 11, 2024A clap icon3
Discovering Web Automation and ScrapingDive into the essentials of web scraping and automation, uncovering strategies to bypass sophisticated web security and captchasFeb 22, 2024A clap icon1Feb 22, 2024A clap icon1
Solving GeeTest CAPTCHA: Automating with Python Against DataDome’s ClaimsBy diving into the Python programming language, we’ll not only understand but also to solve Datadome’s GeeTest CAPTCHAsFeb 1, 2024A clap icon15Feb 1, 2024A clap icon15
Cyber Mystery Behind My Stolen iPhoneImagine the frustration of having your iPhone stolen, only to stumble upon a deeper cyber mystery.Jan 29, 2024A clap icon3Jan 29, 2024A clap icon3
The Empty Promise of a JavaScript “Bypass”: A Developer’s PerspectiveI recently encountered an interesting sales pitch that caught my attention, not for its ingenuity, but for its bold inaccuracy. I was…Nov 9, 2023A clap icon26Nov 9, 2023A clap icon26
Extracting PerimeterX’s Dynamic Functions for Advanced Anti-Bot EvasionIn the cat-and-mouse game of cybersecurity, one name frequently pops up on the defender’s side: PerimeterX. This robust platform stands as…Nov 8, 2023A clap icon5Nov 8, 2023A clap icon5