You are here |
aadityapurani.com | ||
| | | |
blog.ikuamike.io
|
|
| | | | Summary I recently participated in RaziCTF 2020 with team fr344aks and I was able to solve an android challenge that I thought needs a proper writeup. I was able to reverse engineer the provided app and use frida for dynamic analysis for a quick win. Challenge Description: I first installed the app in my genymotion emulator to see the basic functionality. There is a padlock icon constantly changing position on the screen and text at the bottom that says 20000 to break the lock. | |
| | | |
www.bobmonsour.com
|
|
| | | | Just generating a json file from Google Sheets was not good enough. I had to use the API. | |
| | | |
goggleheadedhacker.com
|
|
| | | | Writeups of the Mobile CTF Challenges from HacktivityCon. Learn how to reverse engineer APK files and solve these CTF challenges. | |
| | | |
code.haleby.se
|
|
| |