Figuring out 'hot' functions in native libraries on Android
How to find which functions are being called in a native library in Android when the application has anti-instrumentation?
How to find which functions are being called in a native library in Android when the application has anti-instrumentation?
A data-driven look at how Android malware evades static analysis—permissions, components, and tactics revealed in real-world samples.
Unveiling static analysis evasion techniques in Android malware
apkInspector is a tool designed to provide detailed insights into the zip structure of APK files, offering the capability to …
Lists of the Android Permissions grouped together based on protection level, like dangerous or signature or based on the API …
Dynamic code loading in Android, the methods malware employ to hide malicious behaviour.
Analysis on a malware dropper which was disguised as an Ebay Android app, with a lot of features like premium …
The known apktool, just got a slight upgrade to include a new flag, allowing it to automatically embed a generic/permissive …
A full write-up for the InsecureSHop application, to serve for learning purposes
How an insecure implementation of SetResult can lead to exploitation of the available content providers.
You will currently find 10 categories!
Search articles directly or articles with specific categories or tags!