Farhan NurohmaninMII Cyber Security Consulting ServicesMobileHackingLabs — Strings Lab Write UpOnce we open the Strings application, the homepage will display “Hello from C++”. Then we’ll try to analyze the source code of the…4d ago
RafelinMII Cyber Security Consulting ServicesAndroid Emulator Setup for PenTest Using Android StudioWelcome to the definitive guide on setting up your Android emulator for penetration testing using Android Studio!May 62
Bollu Vyshnavifrida khalo/notes of my thoughtsLet’s keep aside the historical analysis for a bit, even though that is one of the major aspects to understand the artist, Frida Khalo. If…Sep 22Sep 22
AanComplete Beginner’s Guide to Setup Android Pentest Lab without Physical DeviceAre you interested in exploring the field of Android penetration testing but lacking on physical device? This guide will explain how to set…Mar 7Mar 7
Abdul Basit KhanFrida Detection BypassEasy frida detection bypass Tricks/Tips and scripts UwUSep 20Sep 20
Farhan NurohmaninMII Cyber Security Consulting ServicesMobileHackingLabs — Strings Lab Write UpOnce we open the Strings application, the homepage will display “Hello from C++”. Then we’ll try to analyze the source code of the…4d ago
RafelinMII Cyber Security Consulting ServicesAndroid Emulator Setup for PenTest Using Android StudioWelcome to the definitive guide on setting up your Android emulator for penetration testing using Android Studio!May 62
Bollu Vyshnavifrida khalo/notes of my thoughtsLet’s keep aside the historical analysis for a bit, even though that is one of the major aspects to understand the artist, Frida Khalo. If…Sep 22
AanComplete Beginner’s Guide to Setup Android Pentest Lab without Physical DeviceAre you interested in exploring the field of Android penetration testing but lacking on physical device? This guide will explain how to set…Mar 7
Benjamin ChenMemory Forensics: Dumping Android Application MemoryIn the current digital era, safeguarding your client’s sensitive data is the #1 priority. As technology advances, so do the strategies…Feb 22
Mohannad HandoumehinT3CHOWASP UnCrackable 3 Android ApplicationContinuing the OWASPs Uncrackable challenges that I have started before by solving Uncrackable 1 and Uncrackable 2 challenges, I will…Sep 12
DianaOpangaA beginners guide to using Frida to bypass root detection.This is a simple use case to bypass root detection using Frida. For this example we have created a sample APK that has implemented root…Nov 27, 2023