• Welcome
  • About Us
    • Legacy Members
  • Blog
    • Rapid Reads
    • Awareness
    • Cloud
    • Cryptography
    • Development
    • Learning Resources
    • Penetration Testing
    • Securiteenies
    • OSINT
    • Threat Intelligence
    • Wireless
    • Best Practice
    • Special Interest
    • Technical Fundamentals
    • Web
    • Mobile
    • Fraud
    • Frida
    • Governance, Risk and Compliance
  • Newsletter
  • Talks

Recent Posts

  • Android Attack: Malicious APK Walkthrough
  • No Pain, No Gain! Introducing the Pyramid of Pain
  • Untangling the Web: An Introduction to the OWASP Top 10
  • Phishing : Analysing a Phishy
  • Under ATT&CK: An introduction to MITRE ATT&CK

Recent Comments

  • Anisa on Phishing : Analysing a Phishy
  • Sarah on There Ain’t No Party Like an EC2 Party: Creating Your Website
  • Sarah on Android Attack: Reversing React Native Applications
  • Sarah on Android Attack: Reversing React Native Applications
  • Sarah on Phishing : Analysing a Phishy

Archives

Categories

Skip to content
Security Queens
  • Welcome
  • About Us
    • Legacy Members
  • Blog
    • Rapid Reads
    • Awareness
    • Cloud
    • Cryptography
    • Development
    • Learning Resources
    • Penetration Testing
    • Securiteenies
    • OSINT
    • Threat Intelligence
    • Wireless
    • Best Practice
    • Special Interest
    • Technical Fundamentals
    • Web
    • Mobile
    • Fraud
    • Frida
    • Governance, Risk and Compliance
  • Newsletter
  • Talks

Day: 21 August 2020

What in the APK?!

by SarahAndroid, Mobile, Penetration TestingPosted on 21 August 202021 August 2020No Comments

Estimated difficulty: 💜💜💜🤍🤍 This week I wanted to write the first post of a mini mobile application reverse engineering series! There has been a lot of attention in the news about apps such as TikTok and the COVID-19 NHS track and trace app, where they have been shown to have certain security flaws. By writing …

Read more “What in the APK?!”

Powered by WordPress Inspiro WordPress Theme by WPZOOM