Let’s explore android design support library
Annual developers conferences are always amazing and wonderful, comes with new product launches, new announcements, new libraries/frameworks, new APIS and it’s a best opportunity to developers across the world to meet at single place, talk, have party together and what not! Well, so many new stuffs for the android developers are announced during the Google […]
Read MorePart 5 – Reverse Engineering using Virtual Machine
Welcome to the fifth part (and probably last part) of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. A quick glimpse of all parts: Part 1, we talked about Reverse engineering using Androguard tools Part 2 was about deep analysis using Androguard […]
Read MorePart 4 – Online tools for Reverse Engineering and Malware Analysis
Welcome to the fourth part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. So far all the parts in this series are on offline tools for Reverse engineering, in this part we will cover popular online android analysis tools, that help […]
Read MorePart 3 – Reverse engineering using other tools
Welcome to the third part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. In the previous part, we talked about and performed reverse engineering using Androguard tools like Androaxml, Androsim, Androdd, Apkviewer and Androapkinfo. Previous part was about android guard tools […]
Read MorePart 2 – Deep analysis using Androguard tools
Welcome to the second part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. In first part, we learnt how to install Androguard and basic commands to decompile and analyse the apk. In this part, we will check some more features of […]
Read MorePart 1 – Reverse engineering using Androguard
Welcome to the very first article of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. “Learning is no harm, even if done by Reverse Engineering” As quoted above, learning is no harm, if reverse engineering is done for the learning and analysis […]
Read MoreReverse Engineering android application tutorial series
Announcing… Reverse Engineering tutorial series Paresh is doing well with “lazy android developer” series where he has explored many tools and libraries, which are handy and can be useful while developing android application. You might be wondering who is this new author and what I am doing on TechnoTalkative? Well, I am Harsh Dattani, doing […]
Read More