Its clear you put a ton of work into these videos. They are also very informative! Maybe I should dabble in mobile security some day 😁
@hrdcpy8 ай бұрын
The corgi animation and sound fx got me. haha
@hiighjack Жыл бұрын
You’re doing an awesome job with your videos 💪
@jamesvaci7382 Жыл бұрын
Thanks for the awesome tutorials! you rock
@ThanhNguyen-fi4rw Жыл бұрын
Your video is great, could you make a video on unpacking an APK protected by protectors like Virbox Protector?
@Kaelidoz9 ай бұрын
I just clicked for the crt monitors.
@deadbeef2482 Жыл бұрын
Duvet! 🖤
@lauriewired Жыл бұрын
:)
@flopasen Жыл бұрын
11:31 lol
@Zer0nuke Жыл бұрын
New subscriber, great content
@incxbxs Жыл бұрын
what if payload is encrypted? another thing is it looks like after installing it is easy to detect packing without running it, is it not packing itself most of the time rises red flag?
@lauriewired Жыл бұрын
If they payload is encrypted, you could also throw that into JADX and start analyzing it. Usually that's what I end up doing, but here I was just looking to get the payload. Although it's used a lot in malicious apps, packing itself is not a sign of malicious behavior actually. It's common for legit Android devs to try to protect their source code as well.
@incxbxs Жыл бұрын
@@lauriewired how can we contact you? other than comments
@altayakkus4611 Жыл бұрын
Frida Action when???
@lauriewired Жыл бұрын
Soon ;)
@Selvaram Жыл бұрын
i like your videos
@ayushmauryars8 ай бұрын
The only kind of girl I would like to marry 😢 I couldn't find any girl in reverse engineering in my country so far😂