ARCHIVE_LOADED
This article briefly examines the IL2CPP VM initialization and hooking process in a Unity-based mobile game at the native C/C++ layer.
This article introduces the analysis and hooking of native libraries, focusing on JNI-based techniques to bypass sample detection mechanisms.
Vulnerabilities in four main Android components: Activity, Content Provider, Services, and Broadcast Receiver.
Analyzing and bypassing JailMonkey, a React Native library for iOS jailbreak detection using Frida and Ghidra.
Bypassing Android root detection mechanism using static analysis, smali modification, and Frida hooking techniques.
Decompile APK, modify smali code, recompile and sign the APK for Android reverse engineering.
Theory and hands-on practice with Buffer Overflow vulnerability on PCMan FTP Server 2.0.7.