Android Armor

Behind the Code: Android Attacks Unmasked

Dive into the world of native attacks within Android applications, exploring how they operate, understanding protective measures, and developing a simple obfuscator as a hands-on practice tool!



Table Of Contents

Chapter Description
1. Introduction A small introduction about the topic
2. Native Concepts This chapter targets the native concepts, specifically in android applications and in systems in general
3. Hooking This chapter explains memory manipulation (related to Chapter 2), hooking and own-code injection into the target process
4. Protections in Theory This chapter discusses the methods to protect against the types of attacks mentioned in Chapter 3
5. Protections in Action This chapter shows some implementations to what was discussed in Chapter 4
6. Tiny Obfuscator This chapter shows how to make a tiny obfuscator
GET STARTED