midskip
All checks were successful
/ test_checkout (push) Successful in 1m44s

This commit is contained in:
Jean-Marie 'Histausse' Mineau 2025-10-04 00:29:34 +02:00
parent de9674f09c
commit 96b8d24b29
Signed by: histausse
GPG key ID: B66AEEDA9B645AD2
13 changed files with 26 additions and 24 deletions

View file

@ -1,4 +1,4 @@
#import "../lib.typ": APK, IDE, SDK, DEX, ADB, ART, eg, XML, AXML, API, paragraph
#import "../lib.typ": APK, IDE, SDK, DEX, ADB, ART, eg, XML, AXML, API, paragraph, midskip
#import "../lib.typ": jfl-note, todo
=== Reverse Engineering Tools <sec:bg-tools>
@ -85,7 +85,7 @@ The main drawback of using Frida is that it is a known tool, easily detected by
Malware might implement countermeasures that avoid running malicious payloads if Frida is detected.
]
#v(2em)
#midskip
Those tools are quite useful for manual operations.
However, considering the complexity of modern Android applications, it might take a lot of work for a reverse engineer to analyse one application.