🔍
Notes
TwitterGithub
  • 👋Introduction
  • 📚Research
    • 2024
      • Malware Analysis: Wedding Invitation Scam
      • Android Reverse Engineering (Dynamic Class Loader and Native Library)
    • 2023
      • Reverse Engineering APK Built with Flutter
      • Reverse Engineering Application Protected with Pyarmor
      • Analyzing CVE-2021-22204 Based on Network Traffic (PCAP file)
      • Emulating Android Native Library using Qiling - Part 1
      • Machine Learning Model (XGBoost) Reverse Engineering
      • CVE-2021-2461
      • CVE-2022-31367
      • CVE-2023-0046
      • CVE-2023-0048
      • CVE-2023-0316
    • 2022
      • Attacking Non Avalanche AES (Custom AES Implementation)
      • Cracking CRC32 with Forward Polynomial Constant
      • Cheating Game Built with WASM
      • Reverse Engineering Game Boy
      • Partial Known Plaintext Attack on Custom 3DES
    • 2021
      • Reverse Engineering Erlang BEAM File
      • Reverse Engineering Approach on Python Bytecode with Development Version
Powered by GitBook
On this page
  1. Research
  2. 2024

Android Reverse Engineering (Dynamic Class Loader and Native Library)

Study case Final Grey Cat CTF 2023 (title)

Preface

During the final, there are only 4 teams that solved this challenge and i am part of them. This challenge required me to do dynamic analysis using frida and GDB since the application is quite complicated.

To Be Updated

Last updated 1 year ago

📚