Media Summary: CTF Link: ♚ All applications: YouTube ... Decrypting encrypted classes in seconds using In this video, we showcase an advanced optimizer provided with the

Jeb Decompiler Dynamic Addition Of Native Code Libraries When Debugging An Android Apk - Detailed Analysis & Overview

CTF Link: ♚ All applications: YouTube ... Decrypting encrypted classes in seconds using In this video, we showcase an advanced optimizer provided with the JEB Native Debugging - Dynamic additions of native code units after the debugging session started In this video, we use Frida hooking to intercept Learn more about VIBRE at www.pnfsoftware.com/blog/vibe-reversing-with-vibre-ai-assistant.

Using Ghidra to find the location of RegisterNatives API. Ref: jni_all.gdt ... Malware is a fake "TousAntiCovid" app. See - With

Photo Gallery

JEB Decompiler - Dynamic addition of native code libraries when debugging an Android APK
Runtime Debugging Native Android Shared library (.so) file using IDA Pro
Android De-obfuscation: Decrypting Classes with JEB
Debugging Android Dalvik and native code seamlessly with JEB
JEB 2.3 Native Decompilation
JEB Native Debugging - Dynamic additions of native code units after the debugging session started
JEB 2.3 Native Decompilation (CFG Unflattening)
Reversing AppSolid with JEB Debuggers
Android : Debug native code in Android Library
JEB in Action
Hooking Native Android Methods with Frida
Android Reverse Engineering - Reversing Native Libraries (.so / JNI)
View Detailed Profile
JEB Decompiler - Dynamic addition of native code libraries when debugging an Android APK

JEB Decompiler - Dynamic addition of native code libraries when debugging an Android APK

More info: https://www.pnfsoftware.com/

Runtime Debugging Native Android Shared library (.so) file using IDA Pro

Runtime Debugging Native Android Shared library (.so) file using IDA Pro

CTF Link: http://ctf.hpandro.raviramesh.info ♚ All applications: https://github.com/RavikumarRamesh/hpAndro1337 YouTube ...

Android De-obfuscation: Decrypting Classes with JEB

Android De-obfuscation: Decrypting Classes with JEB

Decrypting encrypted classes in seconds using

Debugging Android Dalvik and native code seamlessly with JEB

Debugging Android Dalvik and native code seamlessly with JEB

Demo of our coming release of

JEB 2.3 Native Decompilation

JEB 2.3 Native Decompilation

In this video, we showcase an advanced optimizer provided with the

JEB Native Debugging - Dynamic additions of native code units after the debugging session started

JEB Native Debugging - Dynamic additions of native code units after the debugging session started

JEB Native Debugging - Dynamic additions of native code units after the debugging session started

JEB 2.3 Native Decompilation (CFG Unflattening)

JEB 2.3 Native Decompilation (CFG Unflattening)

In this video, we showcase an advanced optimizer provided with the

Reversing AppSolid with JEB Debuggers

Reversing AppSolid with JEB Debuggers

How to retrieve the original

Android : Debug native code in Android Library

Android : Debug native code in Android Library

Android

JEB in Action

JEB in Action

This demo shows how the

Hooking Native Android Methods with Frida

Hooking Native Android Methods with Frida

In this video, we use Frida hooking to intercept

Android Reverse Engineering - Reversing Native Libraries (.so / JNI)

Android Reverse Engineering - Reversing Native Libraries (.so / JNI)

Episode 0x8 of the

07 - Decompile Android Application (why and how to get APK) - Android application pen-testing course

07 - Decompile Android Application (why and how to get APK) - Android application pen-testing course

why we

JEB Demo - Defeating Reflection of Android Trojan Obad

JEB Demo - Defeating Reflection of Android Trojan Obad

This demo video shows how to leverage

The VIBRE AI assistant help reverse engineer this APK with JEB Pro

The VIBRE AI assistant help reverse engineer this APK with JEB Pro

Learn more about VIBRE at www.pnfsoftware.com/blog/vibe-reversing-with-vibre-ai-assistant.

Ghidra Analysis of Android Native Code

Ghidra Analysis of Android Native Code

Part 2 of the series on

Analyzing Android native library RegisterNatives with ghidra

Analyzing Android native library RegisterNatives with ghidra

Using Ghidra to find the location of RegisterNatives API. Ref: jni_all.gdt ...

JEB3 Demo - Native Code Auto-signing

JEB3 Demo - Native Code Auto-signing

JEB

Unpacking an Android malware with Dexcalibur + JEB

Unpacking an Android malware with Dexcalibur + JEB

Malware is a fake "TousAntiCovid" app. See https://twitter.com/H_Miser/status/1334807559010725891 - With