Software engineer, Applications developer and security analyst.

@TheOverwolf

Latest stories

Sensitive data manipulation and tracing on Android – Privacy – SpotifApp

Users’ privacy is a hot topic nowadays, with billions of applications available with an easy tap – The same tap we used to quickly give on those “I agree” checkboxes (which sometimes are totally missing – which is so bad), without actually reading a line of what we are about to “give an ok”, but it’s fine. We all know that almost 99% of the...

Reverse Engineering – Supercell – part 4

Hello everybody and welcome to the part 4 of my blog post chain about Supercell games reverse engineering! (I start thinking that we should find something new for the intro… My vocabulary is a bit limited). Almost 20 days after my last post, I’m coming with some great news, personal ones and of course, about some new found we did. Let me start with a big thanks and welcome to @Fil...

Reverse Engineering – Supercell – October update, part 3

Hello everybody and welcome to the third chapter of my Supercell reverse engineering posts chain. As said in the second post of the chain, everything has been so quite till the beginning of october, where a missive update has hit Clash Royale, Clash of Clans and Boom Beach. New content has been introduced for almost all of the games and also, I’m happy to see some real security actions that...

Reverse Engineering – Supercell – Clash Royale. Part 2

Almost two month later, here we are with the act two of the Supercell reverse engineering post series, if you missed the first one about the new encryption, it can be found here. Nothing special came in terms of updates on any of the Supercell games after holydays, waiting for the scheduled big one that will hit Clash Royale in the upcoming days and that I’m sure will be fullfit of changes...

Clash of Clans – SuperCell new encryption reverse engineering

In this paper I’m going to speak about what I’ve did to reverse engineer the new encryption, using Clash of Clans as base (The logic used to break CoC could be replicated as well on Boom Beach and HayDay that are already shipped with the new encryption). I’ll skip whatever that’s already known (the previous encryption), as it can be read and understood here:  (SuperCell...

Reverse Engineering: LiveScore.com api encryption

Hello everyone! Everything stated and reported on this post is for study and demonstration purpose. There is no violation or usage of copyrighted code nor abuse of service. The code snippet that can be found on the post are reversed and made opensource under GPL license. Platform: LiveScore.com Api communication: JSON Security measure: body encrypted Request from the original client: URL Status...

PokéMesh – Inizio e fine di un’avventura

In questo primo articolo del mio sito/curriculum voglio raccontare la mia bellissima esperienza ed avventura con PokéMesh andando a toccare punti ed idee personali e punti tecnici che potrebbero richiedere un livello base di logica di programmazione ed informatica. Partiamo dal principio, come nasce PokéMesh. PokéMesh nasce poche settimane dopo la pubblicazione della popolare app Pokémon GO...