<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Crypto on samanl33t/blog</title><link>https://blog.samanl33t.com/tags/crypto/</link><description>Recent content in Crypto on samanl33t/blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 17 May 2026 14:00:00 +0300</lastBuildDate><atom:link href="https://blog.samanl33t.com/tags/crypto/index.xml" rel="self" type="application/rss+xml"/><item><title>Runtime Instrumentation of Qt6 Apps with Frida - Part 2: Building the Bypass Chain</title><link>https://blog.samanl33t.com/writings/0x0004-frida-on-qt6-part-2/</link><pubDate>Sun, 17 May 2026 14:00:00 +0300</pubDate><guid>https://blog.samanl33t.com/writings/0x0004-frida-on-qt6-part-2/</guid><description>&lt;p&gt;In Part 1, we covered visibility - tracing &lt;code&gt;QString&lt;/code&gt;, &lt;code&gt;QMetaObject::activate&lt;/code&gt;, walking metaobjects, and triggering &lt;code&gt;Q_INVOKABLE&lt;/code&gt; methods directly from Frida. In this part, we turn the same primitives into bypasses.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://blog.samanl33t.com/writings/0x0002-introducing-hackpass/"&gt;HackPass&lt;/a&gt; is again our target.&lt;/p&gt;</description></item></channel></rss>