• Follow
  • Follow
  • Follow
  • Follow
  • Follow
Twelvesec
BLOG
  • SERVICES
  • SECTORS
  • TOOLS
  • BLOG
  • ABOUT US
  • SERVICES
    • Security Assurance
    • Security Management
    • Security Training
  • SECTORS
    • Aerospace
    • Automotive
    • Defence
    • Finance
    • Healthcare
    • Law enforcement & Security agencies
    • Manufacturing
    • Maritime
    • Public sector
    • Rail
    • Retail
    • Software development
    • Telecommunications
    • Tourism
  • TOOLS
  • BLOG
  • ABOUT US
    • Twelvesec
    • Clients
    • Life @ Twelvesec
    • Careers
    • News
    • Contact
Bypassing anti-reversing defences in iOS applications

Bypassing anti-reversing defences in iOS applications

by Xenofon Vassilakopoulos | Oct 10, 2023 | 0 comments

Introduction This blog post provides a walktrough on dynamically bypassing anti-debugging and anti-reversing defences in iOS applications. Furthermore, this blog post is using resources from OWASP MASTG and provides a comprehensive guide that discusses about mobile...
How to extract APK file of an Android application

How to extract APK file of an Android application

by George Karpouzas | Sep 19, 2018 | 1 comment

This is a quick and dirty cheat sheet / guide on how to extract Android .apk files from an Android device.   Tools needed: SDK Platform-Tools for Windows Android SDK Platform-Tools is a component for the Android SDK. It includes tools that interface with the...
Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security

Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security

by christina | Oct 26, 2017 | 0 comments

Category: Mobile Security You can download the Mobile Security Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be found here....

LATEST POSTS

  • Digital Operational Resilience Act – DORA – Part II March 7, 2025
  • Digital Operational Resilience Act – DORA February 26, 2025
  • Red Teaming – What is it and do you need it? February 5, 2025
  • Introducing Tabletop Exercises (TTX) December 2, 2024
  • Introducing Incident Handling November 26, 2024
  • The EU NIS 2 Directive October 11, 2024
  • Domain Admin through a simple Xerox Printer July 24, 2024

TAGS

Bashdoor Android Security cell Conditions capture the flag ADSL adb Automotive community 0-days Bearer Token Car Manufacturers business continuity Compliance communication airlines Careers Clients Architecture Review ALPHA BANK Aerospace 0day computer security Apple collaborations Compromise Assessment CDPA 13033 Authorization Token apk Business Impact Assessment Burp Extender Brick & Mortar Application Penetration Test android CCPA Android App Reversing Bank Application Source Code Review Athens Christmas APPI bruteforce ALDI 0-day

ΝΟΤΕ

* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.

STAY CONNECTED

[email protected]

+30 211 182 21 58

LEGAL

  • DATA PROTECTION POLICY
  • TERMS & CONDITIONS

NAVIGATE

  • CONTACT
  • BLOG
  • CAREERS
Copyright 2023 Twelvesec | Created by Amiad