Skip to content

Android RE & security lab: Frida scripts, smali patching, bypass techniques, tools setup, and practical notes. Also available on YouTube: https://www.youtube.com/NomadicDmitry

Notifications You must be signed in to change notification settings

deemoun/android-security-lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 

Repository files navigation

Android Security Lab

πŸ“Œ Reverse-Engineering Android Apps β€” Playlist

A set of practical videos on Android reverse engineering: smali patching, root detection bypass, Frida scripts, traffic interception, emulator workflows, and system internals.


Static root detection bypass using smali modifications and APKTool.


Finding and patching root checks with Jadx + APKTool. Entry-level RE workflow.


Dynamic instrumentation basics with Frida: hooking, tracing, and inspecting runtime behavior.


Overview of Android’s filesystem layout and where applications store their data.


Using ADB, shell commands, emulator configs, and CLI workflows for analysis.


Hands-on examples of Android application manipulation and vulnerability exploration.


Beginner-friendly introduction to static analysis, decompilation, and smali patching.


Combining traffic interception with dynamic hooks for deeper analysis.


Configuring Android emulator networking for MITM, HTTPS interception, and analysis.


In this first episode of my Android Reverse Engineering series, I show how to set up a complete analysis environment for pentesting, security research and malware analysis. Tools covered: Frida, Objection, Drozer, Jadx, APKTool, MobSF, etc.


In this first episode we are installing the tools on our system. Tools covered: Frida, Android Emulator, Android SDK Tools, Android Platform tools, Ghidra

A practical live-coding series where we build real Android apps from scratch using Android Studio, Jetpack Compose, and AI-assisted development. Each stream focuses on implementing new features, improving app architecture, adding security layers, and exploring modern Android development workflows. Perfect for beginners and mid-level developers who want to learn Android by watching full real-time builds with clean explanations.

πŸ”§ Full Android Reverse Engineering Workflow

A compact end-to-end workflow for unpacking, patching, rebuilding, installing, and analyzing Android apps using APKTool + Frida on a rooted emulator.


πŸ“¦ 1. Unpack & Rebuild APK (APKTool)

apktool d app.apk -o unpacked
apktool b unpacked -o app_patched.apk

πŸ” 2. Start Rooted Emulator (optional)

adb root

🧩 3. Push & Run Frida Server

adb push frida-server /data/local/tmp/
adb shell chmod +x /data/local/tmp/frida-server
adb shell /data/local/tmp/frida-server &

πŸ“² 4. Install Target APK on the Emulator

adb install fdroid.apk

🧰 5. Install Frida Tools (Host Side)

python -m venv new_venv
source new_venv/bin/activate
pip3 install frida-tools

πŸ” 6. Find the Target Process on the Emulator

adb shell
adb top

🎯 7. Run Frida Script (example: SSL pinning bypass)

frida -U -p <process_id> -l ssl-pin.js

▢️ Run Script from CodeShare

frida -U -n com.example.app -c codeshare/<script_name>

About

Android RE & security lab: Frida scripts, smali patching, bypass techniques, tools setup, and practical notes. Also available on YouTube: https://www.youtube.com/NomadicDmitry

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published