Learn how to build a complete Android reverse engineering environment.
Timeline:
00:00 — Introduction
00:27 — Static analysis tools overview
02:24 — Dynamic analysis tools (Frida, Objection, DOER)
04:26 — Network & traffic interception tools
05:03 — APK signing & ADB utilities
In this first episode of my Android Reverse Engineering series, I show how to set up a complete analysis environment for pentesting, security research and malware analysis.
Tools covered: Frida, Objection, Drozer, Jadx, APKTool, MobSF, etc.
Support me:
Patreon: https://www.patreon.com/nomadicdmitry
Boosty: https://boosty.to/dmitry.trvlforever/donate
BTC: 15xWdEqwxMoJsXbsrxqv2trbrSLM2dtyfF
Telegram channel about QA and IT (in Russian):
https://t.me/ohotanabagi
#AndroidSecurity #PenTesting #CyberSecurity