Part 5 – Reverse Engineering using Virtual Machine

|

Welcome to the fifth part (and probably last part) of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. A quick glimpse of all parts: Part 1, we talked about Reverse engineering using Androguard tools Part 2 was...

Part 3 – Reverse engineering using other tools

|

Welcome to the third part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. In the previous part, we talked about and performed reverse engineering using Androguard tools like Androaxml, Androsim, Androdd, Apkviewer and Androapkinfo. Previous part...

Part 2 – Deep analysis using Androguard tools

|

Welcome to the second part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. In first part, we learnt how to install Androguard and basic commands to decompile and analyse the apk. In this part, we will...

Part 1 – Reverse engineering using Androguard

|

Welcome to the very first article of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the serious announcement blog post. “Learning is no harm, even if done by Reverse Engineering” As quoted above, learning is no harm, if reverse engineering is done...

Reverse Engineering android application tutorial series

|

Announcing… Reverse Engineering tutorial series Paresh is doing well with “lazy android developer” series where he has explored many tools and libraries, which are handy and can be useful while developing android application. You might be wondering who is this new author and what I am doing on TechnoTalkative? Well,...

#AndroidDev Finding – BluetoothClass

|

If you are andorid developer, you might have thought over this point, how android wear companion app is only listing down android wear devices. Every bluetooth device is having defined bluetooth class and device class. If you do reverse engineering of the android wear companion application, you would get below...