DroidTomeSec
CtrlK
  • Android Pentesting
    • Android App Fundamentals
      • Android Architecture
      • Android App Flow & Directory Structure
      • Android Security Model
      • Android App Components
      • How to use ADB
    • Android App Structure
      • File Structure of an APK
      • AndroidManifest.xml file
      • Permissions
      • Activities
      • Intents
      • BroadcastReceiver
      • Services
      • Content Provider
      • Signing
    • Reverse Engineering APK
      • Reverse Engineering Tools
    • SMALI
      • Introduction to SMALI
      • Registers
      • SMALI File Structure
      • IF statement
      • Smali Code Patching Guide
      • Root Detection
      • Objects and Methods
    • MITM
      • Traffic Interception and SSL Pinning
    • Frida
      • Frida Overview
      • Hooking & Intercepting
      • Calling Methods
      • Script Timing
      • Tracing Activities
      • SSL Validation Bypasses
      • Hooking constructors
      • Android Native Library Analysis
      • Invoking a native function
    • Objection Tutorial
Powered by GitBook
On this page
  1. Android Pentesting

Reverse Engineering APK

Reverse Engineering Tools
PreviousSigningNextReverse Engineering Tools