Media Summary: In this video, we explain how to reverse engineer a In this video, we use Frida hooking to intercept Hi folks, This video covers the exploitation of the

Android Native Code From Zero Dynamic Jni Hidden Method Mapping In Ghidra - Detailed Analysis & Overview

In this video, we explain how to reverse engineer a In this video, we use Frida hooking to intercept Hi folks, This video covers the exploitation of the Join The Family: ‍ Check Out The Courses We Offer: ... In this video I solve the OWASP UnCrackable Level 2 challenge. This one was a bit more complicated than Level 1 and required ... This is a live recording of a talk I gave at TROOPERS23 in Heidelburg, Germany. The presentation explores writing

Photo Gallery

Android Native Code from Zero — Dynamic JNI & Hidden Method Mapping in Ghidra
Android Native Code from Zero — Static JNI & Reverse Engineering with Ghidra
Ghidra Analysis of Android Native Code
Beautifying Native Android Code in Ghidra
Analyzing Android native library RegisterNatives with ghidra
How to reverse engineer JNI in Android with Ghidra
Hooking Native Android Methods with Frida
Android Reverse Engineering - Reversing Native Libraries (.so / JNI)
JNI Flower - Android app exploitation | Using Ghidra/Objection | CTF | Karachi | CyberHackathon.pk
The Best Way To Learn Reverse Engineering
Reversing with Ghidra | Android UnCrackable Level 2
ViewerJNI - Android app exploitation | Using Ghidra and JNI trace | CTF | Lahore | CyberHackathon.pk
View Detailed Profile
Android Native Code from Zero — Dynamic JNI & Hidden Method Mapping in Ghidra

Android Native Code from Zero — Dynamic JNI & Hidden Method Mapping in Ghidra

In this second part, we move from static

Android Native Code from Zero — Static JNI & Reverse Engineering with Ghidra

Android Native Code from Zero — Static JNI & Reverse Engineering with Ghidra

In this video, we start

Ghidra Analysis of Android Native Code

Ghidra Analysis of Android Native Code

Part 2 of the series on

Beautifying Native Android Code in Ghidra

Beautifying Native Android Code in Ghidra

In this video, we take our partially

Analyzing Android native library RegisterNatives with ghidra

Analyzing Android native library RegisterNatives with ghidra

Using

How to reverse engineer JNI in Android with Ghidra

How to reverse engineer JNI in Android with Ghidra

In this video, we explain how to reverse engineer a

Hooking Native Android Methods with Frida

Hooking Native Android Methods with Frida

In this video, we use Frida hooking to intercept

Android Reverse Engineering - Reversing Native Libraries (.so / JNI)

Android Reverse Engineering - Reversing Native Libraries (.so / JNI)

Episode 0x8 of the

JNI Flower - Android app exploitation | Using Ghidra/Objection | CTF | Karachi | CyberHackathon.pk

JNI Flower - Android app exploitation | Using Ghidra/Objection | CTF | Karachi | CyberHackathon.pk

Hi folks, This video covers the exploitation of the

The Best Way To Learn Reverse Engineering

The Best Way To Learn Reverse Engineering

Join The Family: ‍ https://cyberflow-academy.framer.website/ Check Out The Courses We Offer: ...

Reversing with Ghidra | Android UnCrackable Level 2

Reversing with Ghidra | Android UnCrackable Level 2

In this video I solve the OWASP UnCrackable Level 2 challenge. This one was a bit more complicated than Level 1 and required ...

ViewerJNI - Android app exploitation | Using Ghidra and JNI trace | CTF | Lahore | CyberHackathon.pk

ViewerJNI - Android app exploitation | Using Ghidra and JNI trace | CTF | Lahore | CyberHackathon.pk

Hi folks, This video covers the exploitation of the

TROOPERS23: Beyond Java: Obfuscating Android Apps with Purely Native Code

TROOPERS23: Beyond Java: Obfuscating Android Apps with Purely Native Code

This is a live recording of a talk I gave at TROOPERS23 in Heidelburg, Germany. The presentation explores writing