Jan 15, 2026
Reverse Engineering JVM Applications: A Methodology Overview
A high-level look at the methodology I use when analyzing Java applications for security vulnerabilities, from bytecode inspection to dynamic instrumentation.
Hi, I’m Chloe, a Cybersecurity student with hands-on experience analyzing production systems and identifying logic and protocol vulnerabilities.
(more)
NOTE: This website is not finished. Posts and projects are currently in a boilerplate/unfinished state and not to be taken as if they are actual projects or blog posts. Thanks.
A high-level look at the methodology I use when analyzing Java applications for security vulnerabilities, from bytecode inspection to dynamic instrumentation.
Practical considerations for integrating security into backend development workflows, from threat modeling to secure coding patterns.