Learn how to build a complete Android reverse engineering environment.
Timeline:
00:00 — Overview of Android reverse-engineering setup
00:07 — Tools needed & environment (Kali, VirtualBox/VMware)
00:21 — Installing APK Tool
01:15 — Installing Android Platform Tools (ADB)
02:09 — Installing Android Emulator & AVD Manager
04:33 — Fixing VTX emulation issue in VM
05:12 — Installing Frida tools
05:45 — Installing Objection
05:59 — Installing Ghidra
06:17 — Installing mitmproxy
In this first episode we are installing the tools on our system.
Tools covered: Frida, Android Emulator, Android SDK Tools, Android Platform tools, Ghidra
NEW Cross-Platform PulseAPK Core (for decompiling, analysing and building APKs): https://github.com/deemoun/PulseAPK-Core
Support me:
Buy Me A Coffee: buymeacoffee.com/nomadicdmitry
Boosty: https://boosty.to/dmitry.trvlforever/donate
Patreon: https://www.patreon.com/nomadicdmitry
BTC: 15xWdEqwxMoJsXbsrxqv2trbrSLM2dtyfF
Telegram channel about QA and IT (in Russian):
https://t.me/ohotanabagi
#CyberSecurity #PenTesting #AndroidDevelopment