- Home
- Author: Harsh Dattani
Harsh Dattani
Freelance android developer, pursuing masters in Cyber Security and Co-organizer at Google Developers Group Baroda
Part 5 – Reverse Engineering using Virtual Machine
Welcome to the fifth part (and probably last part) of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. A quick glimpse of all parts: Part 1, we talked about Reverse engineering using Androguard tools Part 2 was about deep analysis using Androguard […]
-
Harsh Dattani
- April 21, 2015
Part 4 – Online tools for Reverse Engineering and Malware Analysis
Welcome to the fourth part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. So far all the parts in this series are on offline tools for Reverse engineering, in this part we will cover popular online android analysis tools, that help […]
-
Harsh Dattani
- March 29, 2015
Part 3 – Reverse engineering using other tools
Welcome to the third part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. In the previous part, we talked about and performed reverse engineering using Androguard tools like Androaxml, Androsim, Androdd, Apkviewer and Androapkinfo. Previous part was about android guard tools […]
-
Harsh Dattani
- March 21, 2015
Part 2 – Deep analysis using Androguard tools
Welcome to the second part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. In first part, we learnt how to install Androguard and basic commands to decompile and analyse the apk. In this part, we will check some more features of […]
-
Harsh Dattani
- March 10, 2015
Part 1 – Reverse engineering using Androguard
Welcome to the very first article of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. “Learning is no harm, even if done by Reverse Engineering” As quoted above, learning is no harm, if reverse engineering is done for the learning and analysis […]
-
Harsh Dattani
- March 7, 2015
Reverse Engineering android application tutorial series
Announcing… Reverse Engineering tutorial series Paresh is doing well with “lazy android developer” series where he has explored many tools and libraries, which are handy and can be useful while developing android application. You might be wondering who is this new author and what I am doing on TechnoTalkative? Well, I am Harsh Dattani, doing […]
-
Harsh Dattani
- March 5, 2015
Search
Explore Topics
Short Stories
From Payroll to People: The Evolution of
- 7 min read
How to Host a Web App :
- 6 min read
Why Hiring a Flutter Developer is the
- 10 min read