Published onOctober 27, 2024From Tracing to Patching using FridaReverse-EngineeringFridaAndroidFrida-traceThis article demonstrates the power of Frida tracing in reverse engineering, using Mini Militia Classic as a case study.
Published onApril 21, 2024Android CTF Juicy Bar::BruteforceAndroid-SecurityJuicy-BarReverse-EngineeringWriteupFridaThis article is a write-up of the Bruteforce challenge in the Android CTF Juicy Bar.
Published onApril 7, 2024Android CTF Juicy Bar::Meet FridaAndroid-SecurityJuicy-BarReverse-EngineeringWriteupFridaThis article is a write-up of the Frida challenge in the Android CTF Juicy Bar.
Published onApril 7, 2024Android CTF Juicy Bar::Reverse EngineeringAndroid-SecurityJuicy-BarReverse-EngineeringWriteupThis article is a write-up of the Reverse Engineering challenge in the Android CTF Juicy Bar.
Published onApril 7, 2024Android CTF Juicy Bar::Time TravelAndroid-SecurityJuicy-BarReverse-EngineeringWriteupThis article is a write-up of the Time Travel challenge in the Android CTF Juicy Bar.
Published onApril 6, 2024Android CTF Juicy Bar::Code ObfuscationAndroid-SecurityJuicy-BarReverse-EngineeringWriteupThis article is the write-up of the code obfuscation challenge of the Android CTF Juicy Bar.
Published onApril 6, 2024Android CTF Juicy Bar::Hardcoded SecretsAndroid-SecurityJuicy-BarReverse-EngineeringWriteupThis article is a write-up of the Hardcoded Secrets challenge in the Android CTF Juicy Bar.
Published onApril 6, 2024Android CTF Juicy Bar::Bad HashAndroid-SecurityJuicy-BarReverse-EngineeringWriteupThis article is a write-up of the Bad hash challenge in the Android CTF Juicy Bar.
Published onApril 6, 2024Android CTF Juicy Bar::Obfuscated SecretsAndroid-SecurityJuicy-BarReverse-EngineeringWriteupFridaThis article is a write-up of the Obfuscated Secrets challenge in the Android CTF Juicy Bar.