This is an introductory course for anyone who's interested in reversing android applications.


What you'll learn


Learn to reverse java android applications

Learn to reverse flutter android applications

Learn to reverse react native android applications

Learn to use different tools for reversing android applications

Learn to patch android application

Learn smali basics for reversing

Learn ARM reversing for Android

Learn to solve android ctf challenges

This course includes:

3.5 hours on-demand video

7 downloadable resources

Full lifetime access

Access on mobile and TV

Certificate of completion

Some programming background is assumed

Windows PC


Description


As android security is trending nowadays, it's very necessary to learn about reverse engineering Android applications. 

This short course will give you a firm foundation to start your journey in android reverse engineering. 

Firstly, we will be covering some of the most used tools in android reverse engineering. Then we will move on to topics like decompiling, understanding smali and patching applications, etc. 

You will learn to extract the decompiled source code and understand the working of the application.


Unlike other courses, we won't be wasting half of our time setting up labs.

 we will be diving straight into our topics. Similarly, I won't be wasting your time by explaining unwanted kinds of stuff and theory which don't do any help This is a highly practical course so we will understand mostly everything reversing our custom-made crackme applications rather than just looking at theory and slides.


Unlike earlier days, many applications are built using react native and flutter. 

So we will Reverse flutter and react native applications too. 

We will be also reversing .

so objects using tools like Ghidra.


After learning completing this course I'm sure that you develop the foundation to reverse, understand and patch basic android applications.

 You will be able to do basic android reverse engineering challenges.


NOTE: This is an ongoing course remaining contents will be added weekly


Who this course is for:

CTF Players

Bug Hunters

Security Enthusiasts

Anyone who's interested in Android Reverse Engineering

Previous Post Next Post