Sec-88
Ctrlk
  • 🧑Whoami
  • 🕸️Web-AppSec
  • ✉️API-Sec
  • 📱Android-AppSec
    • Android App Pentesting Checklist
    • Setup Android App Pentesting environment on Arch
    • Setup Android App Pentesting environment on Mac M4
    • Genymotion - Proxying Android App Traffic Through Burp Suite
    • Setup Android Pentesting Environment on Debian Linux
    • Android App Fundamentals
      • Android Architecture
      • Android Security Model
      • Android App Components
    • Android App Components Security Cheatsheet
    • SSL Pinning Bypass
    • Decompile a Hermes React Native Binary
    • Get APK for Target
    • ADB Commands
    • APK structure
    • Android Permissions
    • Exported Activity Hacking
    • BroadcastReceiver Hacking
    • Content Provider Hacking
    • Signing the APK
    • Reverse Engineering APK
    • Deep Links Hacking
    • Drozer Cheat Sheet
    • SMALI
    • Intent Redirection Vulnerability
    • Janus Vulnerability (CVE-2017-13156)
    • Task Hijacking
    • Frida Cheat Sheet
    • Magisk & LSPosed Modules
  • IOS-AppSec
  • 📶Network-Sec
  • 💻Desktop AppSec
  • ☁️Cloud Sec
  • 👨‍💻Programming
  • 🖥️Operating Systems
  • ✍️Write-Ups
Powered by GitBook
On this page

Was this helpful?

Edit
  1. 📱Android-AppSec

Android App Fundamentals

Android ArchitectureAndroid Security ModelAndroid App Components
PreviousSetup Android Pentesting Environment on Debian LinuxNextAndroid Architecture

Was this helpful?