Category: Mobile Security

The IL2CPP: An Unexpected Journey

Hi everyone, In the previous post, we mentioned trace, disassemble, debug and hooking processes of a sample native library. In this article, I will continue in the Native C/C++ Library layer. As a concept, I will talk about the analysis process of a mobile game developed with Unity Hub. This article will be like rediscovering…

Native Library Analysis | Chief JNI

In this article, I will cover the analysis process of native libraries and the hooking process to bypass some sample detection methods. I will show about the dynamic, disassemble and debugging analysis processes of the native package that I wrote….

Android Component Security | The Four Horsemen

An article about the vulnerabilities that can be found on the four main components used in Android Applications. In particular, the attack techniques performed on exported attribute and Implicit Intent were analyzed. As the main concept, PoC provided with methods added to malicious applications, not with ADB(for command-line tools). While not pioneering, technical information on how to avoid these vulnerabilities was also included….

Jailbreak Detection Bypass | JailMonkey

Hi Everyone ! In my previous post, you saw how we can bypass a third party(Rootbeer) root detection mechanism. Now, we will analyze a different third party library on a different platform. The library named JailMonkey is a React Native library for detection if a phone has been jail-broken or rooted for iOS/Android. In this…

Root Detection Bypass | Rootbeer

We need rooted devices to test or analyze Android apps more efficiently. However, applications with root detection mechanism prevent them from opening on rooted devices. In this article, we will learn how to bypass the root detection mechanism over two different techniques….

Decompile, Modify Smali, Recompile and Sign APK


Today, we will decompile a randomly selected apk, then make some changes in the relevant application and compile it again. …