Explore >> Select a destination


You are here

blog.dixitaditya.com
| | www.corellium.com
3.9 parsecs away

Travel
| | iOS applications are distributed as compiled binaries and are not readable by default. Click the blog to learn what goes into iOS reverse engineering.
| | yasoob.me
4.0 parsecs away

Travel
| | Hi everyone! ?? If you have been following my blog then you might have already read the article on reverse engineering an Android app by writing custom smali code. I am still very much a reverse engineering beginner so after that article, I got to learn about Frida. I was told that Frida is much faster and a lot easier for scenarios where I want to snoop on functions. Well, I am glad to report that all the suggestions were absolutely correct.
| | www.guardsquare.com
4.1 parsecs away

Travel
| | Learn how attackers exploit Android apps, and how to stop them. Discover the typical attack process and key Android mobile app security strategies.
| | www.globalsign.com
25.2 parsecs away

Travel
| Need to implement S/MIME certificates without overloading your resources? Check out this guide to learn about efficient S/MIME management.