top of page
Home
Services
Penetration Testing
Vulnerability Assessments
Red Team Assessment
Purple Team Assessment
Digital Forensics
Incident Response
Threat Hunting
Source Code Assessment
Social Engineering Assessment
CISO Consulting
Governance, Risk Management & Compliance
Cybersecurity Readiness Assessment
Cybersecurity Retainer
Contact
About
Training
Blog
More
Use tab to navigate through the menu items.
Contact Us
All Posts
Events
Business Continuity / Disaster Reco
SIEM
Vulnerability Assessments
Threat Hunting
Dark Web
Digital Forensics
Antivirus
Botnets
Exploits
Malware
Mobile Apps
Penetration Testing
Tools
Cyber Industry
Phishing
Social Engineering
CTF
CISO
Cyber Security Insurance
Search
Ian Duffy
May 24, 2015
5 min read
Analysis and Modification of Android Apps
*This blog entry was originally published on May 24, 2015 on the original Polito Blog by Ian Duffy . It was re-posted on October 3, 2017...
bottom of page