|
You are here |
yingtongli.me | ||
| | | | |
blog.jitendrapatro.me
|
|
| | | | | [AI summary] The user is asking for a detailed explanation of how to bypass the root detection in the OWASP Uncrackable Android App. The solution involves two main approaches: using Frida to hook and modify the System.exit(0) call, and using jdb to set breakpoints and alter the behavior of the app. The user also provides code snippets and commands for both methods, highlighting the steps needed to achieve the goal. | |
| | | | |
yasoob.me
|
|
| | | | | Hi everyone! ?? If you have been following my blog then you might have already read the article on reverse engineering an Android app by writing custom smali code. I am still very much a reverse engineering beginner so after that article, I got to learn about Frida. I was told that Frida is much faster and a lot easier for scenarios where I want to snoop on functions. Well, I am glad to report that all the suggestions were absolutely correct. | |
| | | | |
www.yingtongli.me
|
|
| | | | | ||
| | | | |
www.github.com
|
|
| | | Web component to make skeletons. Contribute to mrtrimble/skelly-wc development by creating an account on GitHub. | ||