Тёмный

Android Reverse Engineering Basics | Part 1 | React Native Applications 

Motasem Hamdan | Cyber Security & Tech
Подписаться 48 тыс.
Просмотров 763
50% 1

In this video walkthrough, we covered the first part of Android applications reverse engineering basics where we discussed file format of Android applications, the goals of Android reverse engineering and the tools used such as apktool, Jadx and Ghidra. We analyzed a sample Android app built using React Native framework and analyzed its core logic to extract credentials.
****
Receive Cyber Security Field, Certifications Notes and Special Training Videos
/ @motasemhamdan
******
Writeup
motasem-notes....
********
Google Profile
maps.app.goo.g...
LinkedIn
[1]: / motasem-hamdan-7673289b
[2]: / motasem-eldad-ha-bb424...
Instagram
/ motasem.hamdan.official
Twitter
/ manmotasem
Facebook
/ motasemhamdantty

Опубликовано:

 

7 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 2   
@abhinavbansal-cc8gr
@abhinavbansal-cc8gr 2 месяца назад
need more videos on this topic
@mkeivan829
@mkeivan829 2 месяца назад
Good smoking brother! That was awesome! This educational content, as always, was very clear, well-ordered, and well-structured! Thank you very much, sir!
Далее
кого отпустят гулять чееек
00:53
Trojan.Win32.Canasson
13:10
Просмотров 12 тыс.
Why Are Open Source Alternatives So Bad?
13:06
Просмотров 628 тыс.
Your API Keys are NOT SAFE in a native app 🤬
9:26
кого отпустят гулять чееек
00:53