![SANS Penetration Testing | Modifying Android Apps: A SEC575 Hands-on Exercise, Part 1 | SANS Institute SANS Penetration Testing | Modifying Android Apps: A SEC575 Hands-on Exercise, Part 1 | SANS Institute](https://images.contentstack.io/v3/assets/blt36c2e63521272fdc/blt29080607ae9cda0a/5dfbbad072004b03ce1d1d8f/Blog-41.png)
SANS Penetration Testing | Modifying Android Apps: A SEC575 Hands-on Exercise, Part 1 | SANS Institute
![Android CTF — KGB Messenger. This is a write up of an open source… | by Harshit Maheshwari | InfoSec Write-ups Android CTF — KGB Messenger. This is a write up of an open source… | by Harshit Maheshwari | InfoSec Write-ups](https://miro.medium.com/v2/resize:fit:736/1*Bi7Q_rVomlGzdFko5DJlIw.png)
Android CTF — KGB Messenger. This is a write up of an open source… | by Harshit Maheshwari | InfoSec Write-ups
BytecodeViewer - View smali and java code (Cross-platform) - Platinmods.com - Android & iOS MODs, Mobile Games & Apps
![Bytecode Viewer - A Java 8 Jar & Android Apk Reverse Engineering Suite (Decompiler, Editor, Debugger & More) Bytecode Viewer - A Java 8 Jar & Android Apk Reverse Engineering Suite (Decompiler, Editor, Debugger & More)](https://3.bp.blogspot.com/-2v0xjMnx4O8/WZdnSX4cc0I/AAAAAAAAIm4/TM2k3s26xz4YQWNmLlq-E_-nMNQtNQ_LACLcBGAs/s1600/bytecode-viewer.jpg)