• Follow
  • Follow
  • Follow
  • Follow
  • Follow
Twelvesec
BLOG
  • SERVICES
  • SECTORS
  • TOOLS
  • BLOG
  • ABOUT US
  • SERVICES
    • Security Assurance
    • Security Management
    • Security Training
  • SECTORS
    • Aerospace
    • Automotive
    • Defence
    • Finance
    • Healthcare
    • Law enforcement & Security agencies
    • Manufacturing
    • Maritime
    • Public sector
    • Rail
    • Retail
    • Software development
    • Telecommunications
    • Tourism
  • TOOLS
  • BLOG
  • ABOUT US
    • Twelvesec
    • Clients
    • Life @ Twelvesec
    • Careers
    • News
    • Contact
Bypassing anti-reversing defences in iOS applications

Bypassing anti-reversing defences in iOS applications

by Xenofon Vassilakopoulos | Oct 10, 2023 | 0 comments

Introduction This blog post provides a walktrough on dynamically bypassing anti-debugging and anti-reversing defences in iOS applications. Furthermore, this blog post is using resources from OWASP MASTG and provides a comprehensive guide that discusses about mobile...
How to extract APK file of an Android application

How to extract APK file of an Android application

by George Karpouzas | Sep 19, 2018 | 1 comment

This is a quick and dirty cheat sheet / guide on how to extract Android .apk files from an Android device.   Tools needed: SDK Platform-Tools for Windows Android SDK Platform-Tools is a component for the Android SDK. It includes tools that interface with the...
Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security

Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security

by christina | Oct 26, 2017 | 0 comments

Category: Mobile Security You can download the Mobile Security Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be found here....

LATEST POSTS

  • Digital Operational Resilience Act – DORA – Part II March 7, 2025
  • Digital Operational Resilience Act – DORA February 26, 2025
  • Red Teaming – What is it and do you need it? February 5, 2025
  • Introducing Tabletop Exercises (TTX) December 2, 2024
  • Introducing Incident Handling November 26, 2024
  • The EU NIS 2 Directive October 11, 2024
  • Domain Admin through a simple Xerox Printer July 24, 2024

TAGS

bruteforce 0day Conditions Bank Architecture Review CCPA 0-day Burp Extender Clients capture the flag collaborations adb APPI business continuity ALPHA BANK Compliance Aerospace airlines Automotive Application Source Code Review cell Bearer Token Android Security Athens communication Authorization Token Compromise Assessment Car Manufacturers CDPA ADSL Application Penetration Test Business Impact Assessment Android App Reversing 13033 community Christmas 0-days computer security Apple android ALDI apk Careers Bashdoor Brick & Mortar

ΝΟΤΕ

* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.

STAY CONNECTED

[email protected]

+30 211 182 21 58

LEGAL

  • DATA PROTECTION POLICY
  • TERMS & CONDITIONS

NAVIGATE

  • CONTACT
  • BLOG
  • CAREERS
Copyright 2023 Twelvesec | Created by Amiad