BREAKING:

Let’s explore android design support library

Annual developers conferences are always amazing and wonderful, comes with new product launches, new announcements, new libraries/frameworks, new APIS and it’s a best opportunity to developers across the world to meet at single place, talk, have party together and what not! Well, so many new stuffs for the android developers are announced during the Google […]

Read More

Part 5 – Reverse Engineering using Virtual Machine

Welcome to the fifth part (and probably last part) of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. A quick glimpse of all parts: Part 1, we talked about Reverse engineering using Androguard tools Part 2 was about deep analysis using Androguard […]

Read More

Part 4 – Online tools for Reverse Engineering and Malware Analysis

Welcome to the fourth part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. So far all the parts in this series are on offline tools for Reverse engineering, in this part we will cover popular online android analysis tools, that help […]

Read More

Part 3 – Reverse engineering using other tools

Welcome to the third part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. In the previous part, we talked about and performed reverse engineering using Androguard tools like Androaxml, Androsim, Androdd, Apkviewer and Androapkinfo. Previous part was about android guard tools […]

Read More

Part 2 – Deep analysis using Androguard tools

Welcome to the second part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. In first part, we learnt how to install Androguard and basic commands to decompile and analyse the apk. In this part, we will check some more features of […]

Read More

Part 1 – Reverse engineering using Androguard

Welcome to the very first article of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. “Learning is no harm, even if done by Reverse Engineering” As quoted above, learning is no harm, if reverse engineering is done for the learning and analysis […]

Read More

Reverse Engineering android application tutorial series

Announcing… Reverse Engineering tutorial series Paresh is doing well with “lazy android developer” series where he has explored many tools and libraries, which are handy and can be useful while developing android application. You might be wondering who is this new author and what I am doing on TechnoTalkative? Well, I am Harsh Dattani, doing […]

Read More