Akbar Khanakbarkhan.hashnode.dev·Nov 25, 2024How to Install Docker and Run MobSF for Mobile Security AnalysisThe objective of this document is to provide a comprehensive, step-by-step guide for setting up Mobile Security Framework (MobSF) using Docker. Step 1: Install Docker For Windows: Download Docker Desktop Visit the Docker Desktop download page and dow...Discuss·1 like·48 readsAndroid
G0D_of_CONFIGnoahmugaya.hashnode.dev·Sep 19, 2024A Complete Guide to Pentesting Android ApplicationsIn today's mobile-driven world, Android applications are prime targets for attackers seeking to exploit security flaws. As a penetration tester, understanding the intricacies of Android security is crucial to identifying and mitigating vulnerabilitie...Discuss·119 readsAndroid
Pratik Mhatrepnmhatre.hashnode.dev·Jun 27, 2024Enhancing Network Security: A Comprehensive Guide for DevelopersHello, fellow developers! 👋 Today, we’re diving deep into the crucial world of network security. Ensuring secure communication in our apps is a top priority, and we'll explore some practical and advanced steps you can take to achieve this. So, let’s...DiscussAndroid
Romman Sabbirrommansabbir.com·Jun 23, 2024Android : Managing WebView Callbacks with BuildConfig Securely.In Android development, buildConfigField is a powerful tool for defining constants at build time. It allows developers to embed configuration values directly into the generated BuildConfig class, making them accessible throughout the application code...Discuss·1 like·338 readsAndroid Application Developmentbuildconfig
Ashutosh Wahaneblog.ashutoshwahane.dev·Oct 1, 2023Shielding Your Android AppHi Guys! Do you recall learning in biology class about cells being the fundamental unit of life, with both structural and functional properties? Well, in today's world, mobile phones have become just as essential and fundamental to our daily lives. H...Discuss·4 likes·210 readsAndroid
Bimal Dhitalblog.bimal1412.com.np·Sep 30, 2023Proxying Traffics of Flutter-Based Android Apps Having Split APKs or XAPKIf you are not familiar with the restriction that Flutter-Based Apps have while proxying it's traffic for analysis proposes then you can head over to this blog and read more about it, Bypass SSL Pinning for Flutter Apps using reFlutter Framework | Me...Discuss·227 readsFlutter
Romman Sabbirrommansabbir.com·Sep 17, 2023Android ProGuard : Mastering Security and Efficiency with ProGuardAndroid app development is an exciting endeavor that involves crafting user-friendly applications for a wide range of devices. While developers focus on creating feature-rich apps, they must also consider security and app size optimization. This is w...Discuss·1 like·2.5K readsAndroid Application DevelopmentAndroid
Dhananjay Yadavdhananjayandroid.hashnode.dev·Sep 10, 2023Android application best security practicesThese are some best practices that have a significant, positive impact on your app's security.1. Signing APKs:When you build an Android app, it must be signed with a digital certificate. This process ensures the integrity and authenticity of the app....Discuss·10 likesAndroid