Menu

Close
  • Home
  • Resources
  • Linux Commands
Subscribe
Menu

android

A 3-post collection

Page 1 of 1

Threat Intelligence - Tracing a malicious Android Application

In this blog post, I'm going to walk through some of the methodology that I recently used to gather intelligence from a malicious link that was »

Chris Young Chris Young on Virus Total, URLHaus, Threat Intelligence, Reverse Engineering, android, Forensics 23 March 2022

Creating a malicious mobile app environment - Part 2 of 2

In part one we walked through the process of creating the first two phases of the mobile app environment. If you haven't already done so, you »

Chris Young Chris Young on social engineering, mobile security, msc project, nfc, qr codes, wifi pineapple, android 24 October 2017

Creating a malicious mobile app environment - Part 1 of 2

This article (part 1 of 2) is based around my final submission from my MSc project that I completed last year(2016). A lot has changed »

Chris Young Chris Young on social engineering, mobile security, android, msc project, wifi pineapple, nfc, qr codes 13 October 2017
Page 1 of 1
Information Security Consultant | Pen tester © 2022
Proudly published with Ghost