Media Summary: apktook, signing APK file, smali, reverse engineering Android. Using Android studio to emulate a device, output logs. LSB steganography, Ghidra reverse engineering.
Overview

Pico2019 Droids2 - Detailed Analysis

apktook, signing APK file, smali, reverse engineering Android. Using Android studio to emulate a device, output logs. LSB steganography, Ghidra reverse engineering. XOR encryption, Java source code reversing. Short video on how we can attempt to reverse engineer java source code of an android application. You can use the following ... Reverse engineering Java source code, hex, ascii, octal conversions.

Intel x86 32-bit assembly reverse engineering. Reverse engineering x64 Intel assembly program and brute forcing the password. Used MD5 to create shellcode. If you found this useful then follow the stream and join our discord. ✩ FOLLOW ME DISCORD: Just a video of me, reverse an ELF executable file from reverse_cipher on picoctf with Ghidra.

Gallery

Photo Gallery

Related

Related Shipments