DroidTomeSec
CtrlK
  • Android Pentesting
    • Android App Fundamentals
      • Android Architecture
      • Android App Flow & Directory Structure
      • Android Security Model
      • Android App Components
      • How to use ADB
    • Android App Structure
      • File Structure of an APK
      • AndroidManifest.xml file
      • Permissions
      • Activities
      • Intents
      • BroadcastReceiver
      • Services
      • Content Provider
      • Signing
    • Reverse Engineering APK
      • Reverse Engineering Tools
    • SMALI
      • Introduction to SMALI
      • Registers
      • SMALI File Structure
      • IF statement
      • Smali Code Patching Guide
      • Root Detection
      • Objects and Methods
    • MITM
      • Traffic Interception and SSL Pinning
    • Frida
      • Frida Overview
      • Hooking & Intercepting
      • Calling Methods
      • Script Timing
      • Tracing Activities
      • SSL Validation Bypasses
      • Hooking constructors
      • Android Native Library Analysis
      • Invoking a native function
    • Objection Tutorial
Powered by GitBook
On this page

Android Pentesting

اللَّهُمَّ انْفَعْنَا بِمَا عَلَّمْتَنَا، وَعَلِّمْنَا مَا يَنْفَعُنَا، وَزِدْنَا عِلْمًا، وَأَصْلِحْنَا وَأَصْلِحْ بِنَا الأُمَّةَ.

Android App FundamentalsAndroid App StructureReverse Engineering APKSMALIMITMFridaObjection Tutorial
NextAndroid App Fundamentals

Last updated 1 month ago