Explore >> Select a destination


You are here

aadityapurani.com
| | blog.ikuamike.io
14.0 parsecs away

Travel
| | Summary I recently participated in RaziCTF 2020 with team fr344aks and I was able to solve an android challenge that I thought needs a proper writeup. I was able to reverse engineer the provided app and use frida for dynamic analysis for a quick win. Challenge Description: I first installed the app in my genymotion emulator to see the basic functionality. There is a padlock icon constantly changing position on the screen and text at the bottom that says 20000 to break the lock.
| | www.bobmonsour.com
14.6 parsecs away

Travel
| | Just generating a json file from Google Sheets was not good enough. I had to use the API.
| | goggleheadedhacker.com
19.4 parsecs away

Travel
| | Writeups of the Mobile CTF Challenges from HacktivityCon. Learn how to reverse engineer APK files and solve these CTF challenges.
| | code.haleby.se
93.2 parsecs away

Travel
|