Explore >> Select a destination


You are here

calebfenton.github.io
| | blog.jitendrapatro.me
4.3 parsecs away

Travel
| | [AI summary] The user is asking for a detailed explanation of how to bypass the root detection in the OWASP Uncrackable Android App. The solution involves two main approaches: using Frida to hook and modify the System.exit(0) call, and using jdb to set breakpoints and alter the behavior of the app. The user also provides code snippets and commands for both methods, highlighting the steps needed to achieve the goal.
| | insinuator.net
5.1 parsecs away

Travel
| | This is a write-up about how to use Frida to dump documents from a process after they have been loaded and decrypted. It's a generic and very effective approach demonstrated on a piece of software from North Korea. Some time ago we received an ISO file which was a dump of a CD-ROM from North Korea. The only information we got was that it included a document viewer and various PDF docume ...
| | www.malwaretech.com
4.1 parsecs away

Travel
| | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b...
| | www.securityjourney.com
20.5 parsecs away

Travel
| In this article, we compare the various methods that are used to detect vulnerabilities