Media Summary: In this video I solve the OWASP UnCrackable Level 2 challenge. This one was a bit more complicated than Level 1 and required ... Join The Family: ‍ Check Out The Courses We Offer: ... In this video, we use Frida hooking to intercept

Ghidra Analysis Of Android Native Code - Detailed Analysis & Overview

In this video I solve the OWASP UnCrackable Level 2 challenge. This one was a bit more complicated than Level 1 and required ... Join The Family: ‍ Check Out The Courses We Offer: ... In this video, we use Frida hooking to intercept CTF Link: ♚ All applications: YouTube ... Join the waitlist for my Reverse Engineering Malware: Essential Skills program here: This video ... In this video, we explain how to reverse engineer a

We look at the National Security Agency's (NSA's) reverse engineering toolkit In this video, I show you how to open, decompile, and I will discuss each of the techniques the malware author used in order to prevent reverse engineering of their

Photo Gallery

Ghidra Analysis of Android Native Code
Android Native Code from Zero — Static JNI & Reverse Engineering with Ghidra
Beautifying Native Android Code in Ghidra
Android Native Code from Zero — Dynamic JNI & Hidden Method Mapping in Ghidra
Analyzing Android native library RegisterNatives with ghidra
Reversing with Ghidra | Android UnCrackable Level 2
The Best Way To Learn Reverse Engineering
Emulating Android library to decrypt strings (Qiling Framework)
Hooking Native Android Methods with Frida
Runtime Debugging Native Android Shared library (.so) file using IDA Pro
Where's the native code? (In Android)
Code Analysis with Ghidra
View Detailed Profile
Ghidra Analysis of Android Native Code

Ghidra Analysis of Android Native Code

Part 2 of the series on

Android Native Code from Zero — Static JNI & Reverse Engineering with Ghidra

Android Native Code from Zero — Static JNI & Reverse Engineering with Ghidra

In this video, we start

Beautifying Native Android Code in Ghidra

Beautifying Native Android Code in Ghidra

In this video, we take our partially

Android Native Code from Zero — Dynamic JNI & Hidden Method Mapping in Ghidra

Android Native Code from Zero — Dynamic JNI & Hidden Method Mapping in Ghidra

In this second part, we move from static

Analyzing Android native library RegisterNatives with ghidra

Analyzing Android native library RegisterNatives with ghidra

Using

Reversing with Ghidra | Android UnCrackable Level 2

Reversing with Ghidra | Android UnCrackable Level 2

In this video I solve the OWASP UnCrackable Level 2 challenge. This one was a bit more complicated than Level 1 and required ...

The Best Way To Learn Reverse Engineering

The Best Way To Learn Reverse Engineering

Join The Family: ‍ https://cyberflow-academy.framer.website/ Check Out The Courses We Offer: ...

Emulating Android library to decrypt strings (Qiling Framework)

Emulating Android library to decrypt strings (Qiling Framework)

android

Hooking Native Android Methods with Frida

Hooking Native Android Methods with Frida

In this video, we use Frida hooking to intercept

Runtime Debugging Native Android Shared library (.so) file using IDA Pro

Runtime Debugging Native Android Shared library (.so) file using IDA Pro

CTF Link: http://ctf.hpandro.raviramesh.info ♚ All applications: https://github.com/RavikumarRamesh/hpAndro1337 YouTube ...

Where's the native code? (In Android)

Where's the native code? (In Android)

In this video we look at what is

Code Analysis with Ghidra

Code Analysis with Ghidra

Join the waitlist for my Reverse Engineering Malware: Essential Skills program here: https://go.themalwarelab.co/join This video ...

How to reverse engineer JNI in Android with Ghidra

How to reverse engineer JNI in Android with Ghidra

In this video, we explain how to reverse engineer a

Ghidra: Let's read the Code!

Ghidra: Let's read the Code!

We look at the National Security Agency's (NSA's) reverse engineering toolkit

Reverse Engineering a C Program in Ghidra | Step-by-Step Binary Analysis for Beginners

Reverse Engineering a C Program in Ghidra | Step-by-Step Binary Analysis for Beginners

In this video, I show you how to open, decompile, and

Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library

Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library

I will discuss each of the techniques the malware author used in order to prevent reverse engineering of their