Our Blog

Our news

All you need to know

Kwetza: Infecting Android Applications

Reading time: ~12 min
This blog post describes a method for backdooring Android executables. After describing the manual step, I will show how to...

PwnBank en route to Vegas

Reading time: ~3 min
Everyone has a mobile phone (ok some have two) and the wealth of information people put into them is staggering....

Android hooking with Introspy

Reading time: ~8 min
Here’s my first blog where I’ll try to write up how I’ve managed to set up the Introspy framework for...