Part 4 – Online tools for Reverse Engineering and Malware Analysis
Welcome to the fourth part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. So far all the parts in this series are on offline tools for Reverse engineering, in this part we will cover popular online android analysis tools, that help […]
Read MorePart 3 – Reverse engineering using other tools
Welcome to the third part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. In the previous part, we talked about and performed reverse engineering using Androguard tools like Androaxml, Androsim, Androdd, Apkviewer and Androapkinfo. Previous part was about android guard tools […]
Read MorePart 2 – Deep analysis using Androguard tools
Welcome to the second part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. In first part, we learnt how to install Androguard and basic commands to decompile and analyse the apk. In this part, we will check some more features of […]
Read MorePart 1 – Reverse engineering using Androguard
Welcome to the very first article of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. “Learning is no harm, even if done by Reverse Engineering” As quoted above, learning is no harm, if reverse engineering is done for the learning and analysis […]
Read MoreReverse Engineering android application tutorial series
Announcing… Reverse Engineering tutorial series Paresh is doing well with “lazy android developer” series where he has explored many tools and libraries, which are handy and can be useful while developing android application. You might be wondering who is this new author and what I am doing on TechnoTalkative? Well, I am Harsh Dattani, doing […]
Read More#AndroidDev Finding – BluetoothClass
If you are andorid developer, you might have thought over this point, how android wear companion app is only listing down android wear devices. Every bluetooth device is having defined bluetooth class and device class. If you do reverse engineering of the android wear companion application, you would get below code: Finding: BluetoothClass represents a […]
Read MorePart 10 – The Hitchhiker’s guide to Android Testing
Welcome to the part 10 of the lazy android developers series. In earlier 9 parts, we discussed about UI libraries, dependency injection libraries, wireframe and mockup tools and at last reverse engineering of the android applications. There are couple of parts still left in this series and one of them is Android Testing and for […]
Read More