• Follow
  • Follow
  • Follow
  • Follow
  • Follow
Twelvesec
BLOG
  • SERVICES
    • CYBER ASSURANCE
    • SECURITY MANAGEMENT
    • INCIDENT HANDLING & RESPONSE
    • SECURITY TRAINING
    • SECURE SDLC
  • SECTORS
  • TOOLS
  • BLOG
  • ABOUT US
    • ΤWELVESEC
    • CLIENTS
    • HEADQUARTERS
    • CAREERS
    • NEWS
  • SERVICES
    • CYBER ASSURANCE
    • SECURITY MANAGEMENT
    • INCIDENT HANDLING & RESPONSE
    • SECURITY TRAINING
    • SECURE SDLC
  • SECTORS
    • Aerospace
    • Automotive
    • Defence
    • Finance
    • Healthcare
    • Law enforcement & Security agencies
    • Manufacturing
    • Maritime
    • Public sector
    • Rail
    • Retail
    • Software development
    • Telecommunications
    • Tourism
  • TOOLS
  • BLOG
  • ABOUT US
    • Twelvesec
    • Clients
    • Life @ Twelvesec
    • Careers
    • News
    • Contact
Bypassing anti-reversing defences in iOS applications

Bypassing anti-reversing defences in iOS applications

by Xenofon Vassilakopoulos | Oct 10, 2023 | 0 comments

Introduction This blog post provides a walktrough on dynamically bypassing anti-debugging and anti-reversing defences in iOS applications. Furthermore, this blog post is using resources from OWASP MASTG and provides a comprehensive guide that discusses about mobile...
How to extract APK file of an Android application

How to extract APK file of an Android application

by George Karpouzas | Sep 19, 2018 | 1 comment

This is a quick and dirty cheat sheet / guide on how to extract Android .apk files from an Android device.   Tools needed: SDK Platform-Tools for Windows Android SDK Platform-Tools is a component for the Android SDK. It includes tools that interface with the...
Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security

Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security

by christina | Oct 26, 2017 | 0 comments

Category: Mobile Security You can download the Mobile Security Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be found here....

LATEST POSTS

  • Is user training a good thing? December 9, 2025
  • The three vectors of a pentest engagement. November 14, 2025
  • Securing the Smart Future – Why IoT & Hardware Penetration Testing Is No Longer Optional October 17, 2025
  • Red Teaming: The Art of Adversarial Simulation August 19, 2025
  • Threat Led Penetration Testing: Simulating Tomorrow’s Attacks, Today July 11, 2025
  • Why You Need A Penetration Test Like You Need A Vaccine May 23, 2025
  • Digital Operational Resilience Act – DORA – Part II March 7, 2025

TAGS

ALPHA BANK 0-day android apk 0-days APPI Android App Reversing Apple Athens 13033 adb ADSL ALDI Aerospace 0day Application Source Code Review Android Security Architecture Review Application Penetration Test airlines

ΝΟΤΕ

* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.

STAY CONNECTED

[email protected]

+30 211 182 21 58

LEGAL

  • DATA PROTECTION POLICY
  • TERMS & CONDITIONS

NAVIGATE

  • CONTACT
  • BLOG
  • CAREERS
Copyright 2025 Twelvesec | Created by Amiad