Quickly analyze and reverse engineer Android packages
-
Updated
Dec 13, 2017 - Shell
Quickly analyze and reverse engineer Android packages
Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like Position Independent Executable (PIE), Stack Canaries, and Automatic Reference Counting (ARC) in iOS Applications Binaries.
Simple Bash scripts to make easier Android hacking (mobile pentesting).
Add a description, image, and links to the mobile-pentest topic page so that developers can more easily learn about it.
To associate your repository with the mobile-pentest topic, visit your repo's landing page and select "manage topics."