BLOG
  • SERVICES
  • SECTORS
  • TOOLS
  • BLOG
  • ABOUT US
  • SERVICES
    • Security Assurance
    • Security Management
    • Security Training
  • SECTORS
    • Aerospace
    • Automotive
    • Defence
    • Finance
    • Healthcare
    • Law enforcement & Security agencies
    • Manufacturing
    • Maritime
    • Public sector
    • Rail
    • Retail
    • Software development
    • Telecommunications
    • Tourism
  • TOOLS
  • BLOG
  • ABOUT US
    • Twelvesec
    • Clients
    • Careers
    • News
    • Contact
How to extract APK file of an Android application

How to extract APK file of an Android application

by George Karpouzas | Sep 19, 2018 | 1 comment

This is a quick and dirty cheat sheet / guide on how to extract Android .apk files from an Android device.   Tools needed: SDK Platform-Tools for Windows Android SDK Platform-Tools is a component for the Android SDK. It includes tools that interface with the...
Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security

Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security

by christina | Oct 26, 2017 | 0 comments

Category: Mobile Security You can download the Mobile Security Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be found here....

SUBSCRIBE

Stay up to date with the latest updates

You have Successfully Subscribed!

LATEST POSTS

  • Data protection around the world – Part II March 31, 2021
  • Data protection around the world March 24, 2021
  • The Privacy Shield Frameworks March 3, 2021
  • GDPR vs LGPD February 24, 2021
  • GDPR vs NY SHIELD Act February 10, 2021
  • CCPA vs CPRA February 3, 2021
  • GDPR vs CCPA January 20, 2021

TAGS

Application Penetration Test Reverse Engineering Misconfigurations capture the flag teleworking collaborations Information Leakage partnerships TwelveSec ICT security GDPR compliance GDPR Mobile Security social responsibility Penetration Testing pen-test cyber security Corelan NY SHIELD CCPA infosec Web Application Penetration Testing vulnerabilities android computer security reversing Web Security Covid-19 self-isolation IT security event social distancing Encryption Privacy pentest information security bruteforce Ransomware attacks cybersecurity community Burp Extender ctf Ethics Cyber Defense tool Coronavirus

ΝΟΤΕ

* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.

STAY CONNECTED

[email protected]

+30 211 182 21 58

LEGAL

  • DATA PROTECTION POLICY
  • TERMS & CONDITIONS

NAVIGATE

  • CONTACT
  • BLOG
  • CAREERS
Copyright 2020 Twelvesec | Created by Amiad
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.
REJECTCookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

SAVE & ACCEPT