You are here |
blog.jitendrapatro.me | ||
| | | |
blog.securityinnovation.com
|
|
| | | | Connected devices make up one of the largest attack surfaces. Learn how researchers extract firmware for analysis by reverse engineering updater apps. | |
| | | |
adityarohilla.com
|
|
| | | | Hey people! In this tutorial, we'll develop a basic Audio capturing android application. This tutorial is the second part of the series in which we develop basic Android applications. You can find the previous article on Screen mirroring here: Screen mirroring android app Let's start developing our recorder app. The most common way to do... | |
| | | |
yasoob.me
|
|
| | | | Hi everyone! ?? If you have been following my blog then you might have already read the article on reverse engineering an Android app by writing custom smali code. I am still very much a reverse engineering beginner so after that article, I got to learn about Frida. I was told that Frida is much faster and a lot easier for scenarios where I want to snoop on functions. Well, I am glad to report that all the suggestions were absolutely correct. | |
| | | |
raelize.com
|
|
| | Raelize provides top-notch embedded device security serrvices like consultancy, testing, research and training. |