Explore >> Select a destination


You are here

automationhacks.io
| | blog.jitendrapatro.me
4.0 parsecs away

Travel
| | [AI summary] The user is asking for a detailed explanation of how to bypass the root detection in the OWASP Uncrackable Android App. The solution involves two main approaches: using Frida to hook and modify the System.exit(0) call, and using jdb to set breakpoints and alter the behavior of the app. The user also provides code snippets and commands for both methods, highlighting the steps needed to achieve the goal.
| | yasoob.me
9.5 parsecs away

Travel
| | Hi everyone! ?? If you have been following my blog then you might have already read the article on reverse engineering an Android app by writing custom smali code. I am still very much a reverse engineering beginner so after that article, I got to learn about Frida. I was told that Frida is much faster and a lot easier for scenarios where I want to snoop on functions. Well, I am glad to report that all the suggestions were absolutely correct.
| | piware.de
4.0 parsecs away

Travel
| |
| | gmail.googleblog.com
20.1 parsecs away

Travel
| Posted by Dave Orr, Google Research Product Manager (Cross-posted from the Google Research Blog ) Last week, Inbox by Gmail opened up a...