• Follow
  • Follow
  • Follow
  • Follow
  • Follow
Twelvesec
BLOG
  • SERVICES
  • SECTORS
  • TOOLS
  • BLOG
  • ABOUT US
  • SERVICES
    • Security Assurance
    • Security Management
    • Security Training
  • SECTORS
    • Aerospace
    • Automotive
    • Defence
    • Finance
    • Healthcare
    • Law enforcement & Security agencies
    • Manufacturing
    • Maritime
    • Public sector
    • Rail
    • Retail
    • Software development
    • Telecommunications
    • Tourism
  • TOOLS
  • BLOG
  • ABOUT US
    • Twelvesec
    • Clients
    • Life @ Twelvesec
    • Careers
    • News
    • Contact
Bypassing anti-reversing defences in iOS applications

Bypassing anti-reversing defences in iOS applications

by Xenofon Vassilakopoulos | Oct 10, 2023 | 0 comments

Introduction This blog post provides a walktrough on dynamically bypassing anti-debugging and anti-reversing defences in iOS applications. Furthermore, this blog post is using resources from OWASP MASTG and provides a comprehensive guide that discusses about mobile...
How to extract APK file of an Android application

How to extract APK file of an Android application

by George Karpouzas | Sep 19, 2018 | 1 comment

This is a quick and dirty cheat sheet / guide on how to extract Android .apk files from an Android device.   Tools needed: SDK Platform-Tools for Windows Android SDK Platform-Tools is a component for the Android SDK. It includes tools that interface with the...
Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security

Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security

by christina | Oct 26, 2017 | 0 comments

Category: Mobile Security You can download the Mobile Security Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be found here....

LATEST POSTS

  • Why You Need A Penetration Test Like You Need A Vaccine May 23, 2025
  • Digital Operational Resilience Act – DORA – Part II March 7, 2025
  • Digital Operational Resilience Act – DORA February 26, 2025
  • Red Teaming – What is it and do you need it? February 5, 2025
  • Introducing Tabletop Exercises (TTX) December 2, 2024
  • Introducing Incident Handling November 26, 2024
  • The EU NIS 2 Directive October 11, 2024

TAGS

0-day cell community ADSL CDPA 0day adb Clients android Christmas 13033 Application Penetration Test CCPA Careers apk APPI Athens Car Manufacturers collaborations ALDI airlines communication Android Security Android App Reversing business continuity bruteforce Architecture Review Bank Authorization Token Bashdoor Aerospace Apple Application Source Code Review Conditions Burp Extender Business Impact Assessment Compromise Assessment Bearer Token Automotive Brick & Mortar 0-days capture the flag computer security Compliance ALPHA BANK

ΝΟΤΕ

* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.

STAY CONNECTED

[email protected]

+30 211 182 21 58

LEGAL

  • DATA PROTECTION POLICY
  • TERMS & CONDITIONS

NAVIGATE

  • CONTACT
  • BLOG
  • CAREERS
Copyright 2023 Twelvesec | Created by Amiad