Authors: < nixawk >
- exploiting securing application components
- content provider leakage
- exploiting broadcast receivers
- exploiting unintended data leakage side channel data leakage
- debugging java applications using jdb
- exploiting debuggable android applications
- attacks android webviews
- root detection evasion
- insecure local storage shared preferences
- insecure local storage
- blackbox assessments introspy
- securing shared preferences third party libraries
- introduction drozer
- examining android app specific data non rooted devices
- hacking android apps using backup techniques
- broken cryptography
- cracking android app binaries
- introduction to reverse engineering
- insecure data storage with nosql databases
- debugging apps on android emulator using gdb
- http://www.fasteque.com/android-reverse-engineering-101-part-1/
- http://www.fasteque.com/android-reverse-engineering-101-part-2/
- http://www.fasteque.com/android-reverse-engineering-101-part-3/
- http://www.fasteque.com/android-reverse-engineering-101-part-4/
- http://www.fasteque.com/android-reverse-engineering-101-part-5/
- introduction
- Android-Security-Introduction
- Android-Architecture
- Android-Permissions
- Android-Applications
- Setting-up-Genymotion
- Android-Application-Components
- Dex-Analysis
- Android-Debug-Bridge
- Logging-based-vulnerabilities
- Application-Reversing
- Analyzing-Android-Malwares
- Traffic-Analysis
- SSL-Pinning
- Leaking-Content-Providers
- Drozer-Kung-Fu
- Read-Based-Content-Provider-Vulnerability
- Advanced-Drozer-Kung-Fu
- Drozer-Scripting
- Dropbox-Vulnerability
- Backup-based-vulnerabilities
- Client-Side-Injection
- Hooking-Introduction-and-Setting-up-InsecureBankSetup
- Android-Debugging-with-Andbug
- Debugging-with-JDB
- Automated-Hooking-with-Introspy
- Cydia-Substrate
- Hooking-using-Xposed
- Androguard-Scripting-and-Analysis
- Webview-based-vulnerabilities
- Exploiting-Webviews-with-Metasploit
- Android Security Cookbook
- Android Hacker's Handbook
- Learning Pentesting for Android Devices